Edit tour

Windows Analysis Report
hfs.exe

Overview

General Information

Sample name:hfs.exe
Analysis ID:1358257
MD5:9e8557e98ed1269372ff0ace91d63477
SHA1:d0c4192b65e36553f6fd2b83f3123f6ae8380dac
SHA256:e678899d7ea9702184167b56655f91a69f8a0bdc9df65612762252c053c2cd7c
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Contains functionality to communicate with device drivers
Contains functionality to query locales information (e.g. system language)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • hfs.exe (PID: 6616 cmdline: C:\Users\user\Desktop\hfs.exe MD5: 9E8557E98ED1269372FF0ACE91D63477)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
hfs.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
    hfs.exeINDICATOR_TOOL_HFS_WebServerDetects HFS Web ServerditekSHen
    • 0x37ac:$s1: SOFTWARE\Borland\Delphi\
    • 0x11b120:$s2: C:\code\mine\hfs\scriptLib.pas
    • 0x125a40:$s2: C:\code\mine\hfs\scriptLib.pas
    • 0x126054:$s3: hfs.*;*.htm*;descript.ion;*.comment;*.md5;*.corrupted;*.lnk
    • 0x157cd5:$s3: hfs.*;*.htm*;descript.ion;*.comment;*.md5;*.corrupted;*.lnk
    • 0x157478:$s4: Server: HFS
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.1644100619.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
      SourceRuleDescriptionAuthorStrings
      0.0.hfs.exe.400000.0.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
        0.0.hfs.exe.400000.0.unpackINDICATOR_TOOL_HFS_WebServerDetects HFS Web ServerditekSHen
        • 0x37ac:$s1: SOFTWARE\Borland\Delphi\
        • 0x11b120:$s2: C:\code\mine\hfs\scriptLib.pas
        • 0x125a40:$s2: C:\code\mine\hfs\scriptLib.pas
        • 0x126054:$s3: hfs.*;*.htm*;descript.ion;*.comment;*.md5;*.corrupted;*.lnk
        • 0x157cd5:$s3: hfs.*;*.htm*;descript.ion;*.comment;*.md5;*.corrupted;*.lnk
        • 0x157478:$s4: Server: HFS
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results
        Source: hfs.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET /hfs/hfs.updateinfo.txt HTTP/1.0Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, */*User-Agent: HFS/2.3mHost: www.rejetto.com
        Source: unknownDNS traffic detected: queries for: www.rejetto.com
        Source: hfs.exe, 00000000.00000002.2898429385.00000000049B3000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: HTTP://TRENTRICHARDSON.COM
        Source: hfs.exe, 00000000.00000002.2898429385.00000000049B3000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: HTTP://TRENTRICHARDSON.COM/IMPROMPTU/GPL-LICENSE.TXT
        Source: hfs.exe, 00000000.00000002.2898429385.00000000049B3000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: HTTP://TRENTRICHARDSON.COM/IMPROMPTU/MIT-LICENSE.TXT
        Source: hfs.exe, 00000000.00000002.2898429385.00000000049B3000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: HTTP://WWW.REJETTO.COM/HFS/
        Source: hfs.exe, 00000000.00000002.2896900787.000000000019A000.00000004.00000010.00020000.00000000.sdmp, hfs.exe, 00000000.00000002.2897438805.000000000241A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://192.168.2.4/
        Source: hfs.exe, 00000000.00000002.2897244050.0000000000850000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.168.2.4/L
        Source: hfs.exeString found in binary or memory: http://2ip.ru
        Source: hfs.exeString found in binary or memory: http://checkip.dyndns.org
        Source: hfs.exeString found in binary or memory: http://hfsservice.rejetto.com/ipservices.php
        Source: hfs.exeString found in binary or memory: http://hfstest.rejetto.com/?port=
        Source: hfs.exeString found in binary or memory: http://jquery.com/
        Source: hfs.exeString found in binary or memory: http://jquery.org/license
        Source: hfs.exeString found in binary or memory: http://rejetto.webfactional.com/hfs/ip.php
        Source: hfs.exeString found in binary or memory: http://sizzlejs.com/
        Source: hfs.exeString found in binary or memory: http://trentrichardson.com
        Source: hfs.exeString found in binary or memory: http://trentrichardson.com/Impromptu/GPL-LICENSE.txt
        Source: hfs.exeString found in binary or memory: http://trentrichardson.com/Impromptu/MIT-LICENSE.txt
        Source: hfs.exeString found in binary or memory: http://www.alexnolan.net/ip/
        Source: hfs.exeString found in binary or memory: http://www.canyouseeme.org
        Source: hfs.exeString found in binary or memory: http://www.cjb.net/cgi-bin/dynip.cgi?username=
        Source: hfs.exeString found in binary or memory: http://www.mario-online.com/mio_indirizzo_ip.php
        Source: hfs.exeString found in binary or memory: http://www.melauto.it/public/rejetto/ip.php
        Source: hfs.exeString found in binary or memory: http://www.rejetto.com/forum/
        Source: hfs.exeString found in binary or memory: http://www.rejetto.com/forum/U
        Source: hfs.exeString found in binary or memory: http://www.rejetto.com/hfs-donate
        Source: hfs.exeString found in binary or memory: http://www.rejetto.com/hfs-donateU
        Source: hfs.exeString found in binary or memory: http://www.rejetto.com/hfs/
        Source: hfs.exeString found in binary or memory: http://www.rejetto.com/hfs/U
        Source: hfs.exeString found in binary or memory: http://www.rejetto.com/hfs/guide/
        Source: hfs.exeString found in binary or memory: http://www.rejetto.com/hfs/guide/U
        Source: hfs.exeString found in binary or memory: http://www.rejetto.com/hfs/guide/intro.html
        Source: hfs.exeString found in binary or memory: http://www.rejetto.com/hfs/guide/intro.htmlU
        Source: hfs.exeString found in binary or memory: http://www.rejetto.com/hfs/hfs.updateinfo.txt
        Source: hfs.exeString found in binary or memory: http://www.rejetto.com/sw/?faq=hfs
        Source: hfs.exeString found in binary or memory: http://www.rejetto.com/sw/?faq=hfsU
        Source: hfs.exeString found in binary or memory: http://www.rejetto.com/sw/license.txt
        Source: hfs.exeString found in binary or memory: http://www.rejetto.com/sw/license.txtU
        Source: hfs.exeString found in binary or memory: http://www.rejetto.com/wiki/?title=HFS:_Event_scripts
        Source: hfs.exeString found in binary or memory: http://www.whatsmyrealip.com/

        System Summary

        barindex
        Source: hfs.exe, type: SAMPLEMatched rule: Detects HFS Web Server Author: ditekSHen
        Source: 0.0.hfs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects HFS Web Server Author: ditekSHen
        Source: C:\Users\user\Desktop\hfs.exeCode function: 0_2_00407FCE: DeviceIoControl,0_2_00407FCE
        Source: hfs.exe, 00000000.00000000.1644100619.0000000000401000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename vs hfs.exe
        Source: hfs.exeBinary or memory string: OriginalFilename vs hfs.exe
        Source: hfs.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: hfs.exe, type: SAMPLEMatched rule: INDICATOR_TOOL_HFS_WebServer author = ditekSHen, description = Detects HFS Web Server
        Source: 0.0.hfs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_TOOL_HFS_WebServer author = ditekSHen, description = Detects HFS Web Server
        Source: hfs.exeBinary string: @\??\C:\Device\LanmanRedirector\U
        Source: classification engineClassification label: mal48.winEXE@1/0@1/1
        Source: C:\Users\user\Desktop\hfs.exeFile created: C:\Users\user\Desktop\test.tmp~606732469.tmpJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeMutant created: \Sessions\1\BaseNamedObjects\HttpFileServer
        Source: Yara matchFile source: hfs.exe, type: SAMPLE
        Source: Yara matchFile source: 0.0.hfs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000000.1644100619.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
        Source: C:\Users\user\Desktop\hfs.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeFile read: C:\Windows\win.iniJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: hfs.exeString found in binary or memory: /Address family not supported by protocol family
        Source: hfs.exeString found in binary or memory: %number-addresses%
        Source: hfs.exeString found in binary or memory: %number-addresses-ever%
        Source: hfs.exeString found in binary or memory: %number-addresses-downloading%
        Source: hfs.exeString found in binary or memory: %item-added-dt%
        Source: hfs.exeString found in binary or memory: %item-added%
        Source: hfs.exeString found in binary or memory: log-server-start=
        Source: hfs.exeString found in binary or memory: log-server-stop=
        Source: hfs.exeString found in binary or memory: reload-on-startup=
        Source: hfs.exeString found in binary or memory: find-external-on-startup=
        Source: hfs.exeString found in binary or memory: do-not-log-address=
        Source: hfs.exeString found in binary or memory: last-external-address=
        Source: hfs.exeString found in binary or memory: copy-url-on-start=
        Source: hfs.exeString found in binary or memory: copy-url-on-addition=
        Source: hfs.exeString found in binary or memory: log-server-start
        Source: hfs.exeString found in binary or memory: log-server-stop
        Source: hfs.exeString found in binary or memory: copy-url-on-addition
        Source: hfs.exeString found in binary or memory: copy-url-on-start
        Source: hfs.exeString found in binary or memory: reload-on-startup
        Source: hfs.exeString found in binary or memory: find-external-on-startup
        Source: hfs.exeString found in binary or memory: do-not-log-address
        Source: hfs.exeString found in binary or memory: last-external-address
        Source: hfs.exeString found in binary or memory: -START "" /WAIT "%s" -q
        Source: hfs.exeString found in binary or memory: }//addPagingButton
        Source: C:\Users\user\Desktop\hfs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9FC8E510-A27C-4B3B-B9A3-BF65F00256A8}\InProcServer32Jump to behavior
        Source: C:\Users\user\Desktop\hfs.exeWindow found: window name: TButtonJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeFile opened: C:\Windows\SysWOW64\RICHED32.DLLJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: hfs.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
        Source: hfs.exeStatic file information: File size 2171904 > 1048576
        Source: hfs.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x176800
        Source: C:\Users\user\Desktop\hfs.exeCode function: 0_2_004079E6 push 00407A43h; ret 0_2_00407A3B
        Source: C:\Users\user\Desktop\hfs.exeCode function: 0_2_004079E8 push 00407A43h; ret 0_2_00407A3B
        Source: C:\Users\user\Desktop\hfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: hfs.exe, 00000000.00000002.2897244050.00000000008AD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll>7
        Source: C:\Users\user\Desktop\hfs.exeCode function: RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,GetLocaleInfoA,LoadLibraryExA,LoadLibraryExA,0_2_00407070
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
        Valid Accounts2
        Command and Scripting Interpreter
        Path InterceptionPath Interception1
        Masquerading
        OS Credential Dumping1
        Security Software Discovery
        Remote ServicesData from Local SystemExfiltration Over Other Network Medium2
        Non-Application Layer Protocol
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
        Obfuscated Files or Information
        LSASS Memory1
        File and Directory Discovery
        Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth2
        Application Layer Protocol
        SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
        Domain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager11
        System Information Discovery
        SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
        Ingress Tool Transfer
        Data Encrypted for ImpactDNS ServerEmail Addresses
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1358257 Sample: hfs.exe Startdate: 11/12/2023 Architecture: WINDOWS Score: 48 9 www.rejetto.com 2->9 13 Malicious sample detected (through community Yara rule) 2->13 6 hfs.exe 5 4 2->6         started        signatures3 process4 dnsIp5 11 www.rejetto.com 94.23.66.84, 49735, 80 OVHFR France 6->11

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://checkip.dyndns.org0%URL Reputationsafe
        http://www.melauto.it/public/rejetto/ip.php0%Avira URL Cloudsafe
        http://192.168.2.4/0%Avira URL Cloudsafe
        http://192.168.2.4/L0%Avira URL Cloudsafe
        http://www.alexnolan.net/ip/0%Avira URL Cloudsafe
        http://www.whatsmyrealip.com/0%Avira URL Cloudsafe
        http://www.mario-online.com/mio_indirizzo_ip.php0%Avira URL Cloudsafe
        http://rejetto.webfactional.com/hfs/ip.php0%Avira URL Cloudsafe

        Download Network PCAP: filteredfull

        NameIPActiveMaliciousAntivirus DetectionReputation
        www.rejetto.com
        94.23.66.84
        truefalse
          high
          NameMaliciousAntivirus DetectionReputation
          http://www.rejetto.com/hfs/hfs.updateinfo.txtfalse
            high
            NameSourceMaliciousAntivirus DetectionReputation
            HTTP://WWW.REJETTO.COM/HFS/hfs.exe, 00000000.00000002.2898429385.00000000049B3000.00000004.00001000.00020000.00000000.sdmpfalse
              high
              http://www.canyouseeme.orghfs.exefalse
                high
                http://jquery.org/licensehfs.exefalse
                  high
                  http://www.rejetto.com/hfs/guide/intro.htmlhfs.exefalse
                    high
                    http://192.168.2.4/hfs.exe, 00000000.00000002.2896900787.000000000019A000.00000004.00000010.00020000.00000000.sdmp, hfs.exe, 00000000.00000002.2897438805.000000000241A000.00000004.00001000.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.cjb.net/cgi-bin/dynip.cgi?username=hfs.exefalse
                      high
                      http://www.rejetto.com/wiki/?title=HFS:_Event_scriptshfs.exefalse
                        high
                        http://www.alexnolan.net/ip/hfs.exefalse
                        • Avira URL Cloud: safe
                        unknown
                        http://sizzlejs.com/hfs.exefalse
                          high
                          http://www.rejetto.com/sw/?faq=hfsUhfs.exefalse
                            high
                            http://www.rejetto.com/hfs/Uhfs.exefalse
                              high
                              HTTP://TRENTRICHARDSON.COM/IMPROMPTU/GPL-LICENSE.TXThfs.exe, 00000000.00000002.2898429385.00000000049B3000.00000004.00001000.00020000.00000000.sdmpfalse
                                high
                                http://www.rejetto.com/hfs/guide/Uhfs.exefalse
                                  high
                                  http://checkip.dyndns.orghfs.exefalse
                                  • URL Reputation: safe
                                  unknown
                                  http://rejetto.webfactional.com/hfs/ip.phphfs.exefalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.rejetto.com/hfs/guide/intro.htmlUhfs.exefalse
                                    high
                                    http://www.melauto.it/public/rejetto/ip.phphfs.exefalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.rejetto.com/hfs-donateUhfs.exefalse
                                      high
                                      http://www.mario-online.com/mio_indirizzo_ip.phphfs.exefalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.rejetto.com/sw/license.txthfs.exefalse
                                        high
                                        http://www.rejetto.com/hfs/hfs.exefalse
                                          high
                                          http://www.rejetto.com/sw/license.txtUhfs.exefalse
                                            high
                                            http://trentrichardson.com/Impromptu/GPL-LICENSE.txthfs.exefalse
                                              high
                                              http://trentrichardson.com/Impromptu/MIT-LICENSE.txthfs.exefalse
                                                high
                                                http://www.rejetto.com/forum/hfs.exefalse
                                                  high
                                                  http://www.rejetto.com/hfs-donatehfs.exefalse
                                                    high
                                                    HTTP://TRENTRICHARDSON.COM/IMPROMPTU/MIT-LICENSE.TXThfs.exe, 00000000.00000002.2898429385.00000000049B3000.00000004.00001000.00020000.00000000.sdmpfalse
                                                      high
                                                      http://2ip.ruhfs.exefalse
                                                        high
                                                        http://hfsservice.rejetto.com/ipservices.phphfs.exefalse
                                                          high
                                                          http://192.168.2.4/Lhfs.exe, 00000000.00000002.2897244050.0000000000850000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          http://www.rejetto.com/hfs/guide/hfs.exefalse
                                                            high
                                                            http://www.rejetto.com/forum/Uhfs.exefalse
                                                              high
                                                              http://www.whatsmyrealip.com/hfs.exefalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              HTTP://TRENTRICHARDSON.COMhfs.exe, 00000000.00000002.2898429385.00000000049B3000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                high
                                                                http://trentrichardson.comhfs.exefalse
                                                                  high
                                                                  http://hfstest.rejetto.com/?port=hfs.exefalse
                                                                    high
                                                                    http://jquery.com/hfs.exefalse
                                                                      high
                                                                      http://www.rejetto.com/sw/?faq=hfshfs.exefalse
                                                                        high
                                                                        • No. of IPs < 25%
                                                                        • 25% < No. of IPs < 50%
                                                                        • 50% < No. of IPs < 75%
                                                                        • 75% < No. of IPs
                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                        94.23.66.84
                                                                        www.rejetto.comFrance
                                                                        16276OVHFRfalse
                                                                        Joe Sandbox version:38.0.0 Ammolite
                                                                        Analysis ID:1358257
                                                                        Start date and time:2023-12-11 11:37:27 +01:00
                                                                        Joe Sandbox product:CloudBasic
                                                                        Overall analysis duration:0h 4m 9s
                                                                        Hypervisor based Inspection enabled:false
                                                                        Report type:full
                                                                        Cookbook file name:default.jbs
                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                        Number of analysed new started processes analysed:5
                                                                        Number of new started drivers analysed:0
                                                                        Number of existing processes analysed:0
                                                                        Number of existing drivers analysed:0
                                                                        Number of injected processes analysed:0
                                                                        Technologies:
                                                                        • HCA enabled
                                                                        • EGA enabled
                                                                        • AMSI enabled
                                                                        Analysis Mode:default
                                                                        Analysis stop reason:Timeout
                                                                        Sample name:hfs.exe
                                                                        Detection:MAL
                                                                        Classification:mal48.winEXE@1/0@1/1
                                                                        EGA Information:
                                                                        • Successful, ratio: 100%
                                                                        HCA Information:
                                                                        • Successful, ratio: 100%
                                                                        • Number of executed functions: 7
                                                                        • Number of non-executed functions: 1
                                                                        Cookbook Comments:
                                                                        • Found application associated with file extension: .exe
                                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                        • VT rate limit hit for: hfs.exe
                                                                        No simulations
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        94.23.66.84hfs.exeGet hashmaliciousUnknownBrowse
                                                                        • www.rejetto.com/hfs/download
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        www.rejetto.comMDE_File_Sample_d0c4192b65e36553f6fd2b83f3123f6ae8380dac.zipGet hashmaliciousUnknownBrowse
                                                                        • 94.23.66.84
                                                                        hfs.exeGet hashmaliciousUnknownBrowse
                                                                        • 94.23.66.84
                                                                        ijxxKAiHHB.exeGet hashmaliciousUnknownBrowse
                                                                        • 185.20.49.7
                                                                        hfs.exeGet hashmaliciousUnknownBrowse
                                                                        • 185.20.49.7
                                                                        hfs.exeGet hashmaliciousUnknownBrowse
                                                                        • 185.20.49.7
                                                                        hfs.exeGet hashmaliciousUnknownBrowse
                                                                        • 185.20.49.7
                                                                        hfs.exeGet hashmaliciousBrowse
                                                                        • 185.20.49.7
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        OVHFRSecuriteInfo.com.Win32.PWSX-gen.21665.13004.exeGet hashmaliciousSnake Keylogger, zgRATBrowse
                                                                        • 51.38.247.67
                                                                        4821de1d9972b0e89c11d4c5c03406c6daf2a1f4ab951.exeGet hashmaliciousRedLineBrowse
                                                                        • 178.33.57.150
                                                                        SecuriteInfo.com.Trojan.SuspectCRC.15279.10291.exeGet hashmaliciousXmrigBrowse
                                                                        • 54.36.98.147
                                                                        EV2YXL6TFq.exeGet hashmaliciousPureLog StealerBrowse
                                                                        • 51.79.32.112
                                                                        SecuriteInfo.com.Trojan.SuspectCRC.4046.15198.exeGet hashmaliciousXmrigBrowse
                                                                        • 54.36.98.147
                                                                        UTGUvyWq8s.exeGet hashmaliciousXmrigBrowse
                                                                        • 54.36.98.147
                                                                        5kyicRtwCD.exeGet hashmaliciousPureLog StealerBrowse
                                                                        • 51.79.32.112
                                                                        qvX9Cyuqyq.exeGet hashmaliciousPureLog Stealer, Vidar, XmrigBrowse
                                                                        • 51.79.32.112
                                                                        G0k5A7CSy7.exeGet hashmaliciousPureLog Stealer, XmrigBrowse
                                                                        • 51.79.32.112
                                                                        PVXE2epewW.exeGet hashmaliciousPureLog Stealer, Xmrig, zgRATBrowse
                                                                        • 51.79.32.112
                                                                        https://pub-8bc8adf4c2ec4de4a4b24ee9dcfceef1.r2.dev/443.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                        • 46.105.57.169
                                                                        QUOTATION#35674.exeGet hashmaliciousAgentTeslaBrowse
                                                                        • 176.31.224.117
                                                                        Maersk_MRKU8781602.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                        • 51.38.247.67
                                                                        https://alccaulking.com/red/Get hashmaliciousPhisherBrowse
                                                                        • 144.217.74.140
                                                                        FACTURAS.jsGet hashmaliciousAgentTeslaBrowse
                                                                        • 37.187.135.80
                                                                        WrrCV4QR2J.exeGet hashmaliciousFormBookBrowse
                                                                        • 94.23.162.163
                                                                        jKkDc50MRn.exeGet hashmaliciousXmrigBrowse
                                                                        • 176.31.124.7
                                                                        SecuriteInfo.com.Win32.RATX-gen.20278.7554.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                        • 51.38.247.67
                                                                        jKkDc50MRn.exeGet hashmaliciousUnknownBrowse
                                                                        • 176.31.124.7
                                                                        OYT57DouoW.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                        • 92.222.139.156
                                                                        No context
                                                                        No context
                                                                        No created / dropped files found
                                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                        Entropy (8bit):6.57278230008726
                                                                        TrID:
                                                                        • Win32 Executable (generic) a (10002005/4) 99.53%
                                                                        • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
                                                                        • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                                        • DOS Executable Generic (2002/1) 0.02%
                                                                        File name:hfs.exe
                                                                        File size:2'171'904 bytes
                                                                        MD5:9e8557e98ed1269372ff0ace91d63477
                                                                        SHA1:d0c4192b65e36553f6fd2b83f3123f6ae8380dac
                                                                        SHA256:e678899d7ea9702184167b56655f91a69f8a0bdc9df65612762252c053c2cd7c
                                                                        SHA512:c1a338c0414ac68d7ce24df06f3b665a56feae15063332324fea3250f1e77c19209ea3d89fe3a06d48974cce70bd9c65d59b7e2fbaf27c3f01ac2e898057e9ec
                                                                        SSDEEP:49152:UR0LvNmmh9otEKMx9XSNVBOw+V4UvEbAThhiqvyo98ZcW7SZ:UR0xmmh9GEKgpSNVBr72QN
                                                                        TLSH:ECA56B22F690C437D17736799CA793C56928BB502E14990B3AE87F4CBF793C13D1229A
                                                                        File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                                        Icon Hash:1b3b13333101860c
                                                                        Entrypoint:0x579ca0
                                                                        Entrypoint Section:.itext
                                                                        Digitally signed:false
                                                                        Imagebase:0x400000
                                                                        Subsystem:windows gui
                                                                        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                                        DLL Characteristics:NX_COMPAT
                                                                        Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                                        TLS Callbacks:
                                                                        CLR (.Net) Version:
                                                                        OS Version Major:4
                                                                        OS Version Minor:0
                                                                        File Version Major:4
                                                                        File Version Minor:0
                                                                        Subsystem Version Major:4
                                                                        Subsystem Version Minor:0
                                                                        Import Hash:eb58f6a65d91e853b4dcfa5f6c10386b
                                                                        Instruction
                                                                        push ebp
                                                                        mov ebp, esp
                                                                        add esp, FFFFFFECh
                                                                        push ebx
                                                                        xor eax, eax
                                                                        mov dword ptr [ebp-14h], eax
                                                                        mov eax, 005771F0h
                                                                        call 00007F3421091C8Bh
                                                                        mov ebx, dword ptr [00582958h]
                                                                        xor eax, eax
                                                                        push ebp
                                                                        push 00579E14h
                                                                        push dword ptr fs:[eax]
                                                                        mov dword ptr fs:[eax], esp
                                                                        mov eax, dword ptr [005825DCh]
                                                                        mov eax, dword ptr [eax]
                                                                        mov dword ptr [eax+14h], 0057704Ch
                                                                        push 00000011h
                                                                        call 00007F3421092906h
                                                                        movsx eax, ax
                                                                        test ah, FFFFFF80h
                                                                        jne 00007F3421203E9Eh
                                                                        mov eax, dword ptr [005825DCh]
                                                                        mov eax, dword ptr [eax]
                                                                        mov edx, 00579E2Ch
                                                                        call 00007F342111B6BDh
                                                                        test al, al
                                                                        jne 00007F3421203E62h
                                                                        mov eax, dword ptr [005825DCh]
                                                                        mov eax, dword ptr [eax]
                                                                        mov ecx, dword ptr [eax+0Ch]
                                                                        lea eax, dword ptr [ebp-14h]
                                                                        mov edx, 00579E44h
                                                                        call 00007F342108F8A2h
                                                                        mov eax, dword ptr [ebp-14h]
                                                                        xor ecx, ecx
                                                                        mov edx, 00000010h
                                                                        call 00007F342119C13Fh
                                                                        mov eax, 00000001h
                                                                        call 00007F342108F48Dh
                                                                        mov eax, dword ptr [005825DCh]
                                                                        mov eax, dword ptr [eax]
                                                                        cmp byte ptr [eax+08h], 00000000h
                                                                        jne 00007F3421203E4Ch
                                                                        call 00007F34212011DBh
                                                                        test al, al
                                                                        je 00007F3421203E43h
                                                                        mov eax, dword ptr [005825DCh]
                                                                        mov eax, dword ptr [eax]
                                                                        call 00007F342111B73Fh
                                                                        jmp 00007F3421203EE0h
                                                                        mov eax, dword ptr [ebx]
                                                                        call 00007F34211197CBh
                                                                        mov eax, dword ptr [00582A14h]
                                                                        mov eax, dword ptr [eax]
                                                                        mov dl, 01h
                                                                        call 00007F342112FF65h
                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x1910000x3966.idata
                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x1ad0000x77600.rsrc
                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x1970000x15764.reloc
                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x1960180x2d.rdata
                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x1960000x18.rdata
                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x191acc0x8d8.idata
                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                        .text0x10000x1766b80x176800False0.46303404539385845data6.429015159978142IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                        .itext0x1780000x1e640x2000False0.549072265625data6.18976186886786IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                        .data0x17a0000x8c940x8e00False0.5568056778169014data5.687851591548669IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                        .bss0x1830000xd9740x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                        .idata0x1910000x39660x3a00False0.31276939655172414data5.164467768035724IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                        .tls0x1950000x440x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                        .rdata0x1960000x450x200False0.142578125data0.9956758247090713IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                        .reloc0x1970000x157640x15800False0.5875726744186046data6.701161684807333IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                        .rsrc0x1ad0000x776000x77600False0.3714721040575916data5.963918185992459IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                        GIF0x1aea000x179eGIF image data, version 89a, 387 x 169EnglishUnited States1.0018193847171684
                                                                        TEXT0x1b01a00x30bASCII text, with CRLF line terminatorsEnglishUnited States0.4672657252888318
                                                                        TEXT0x1b04ac0x109ASCII text, with CRLF line terminatorsEnglishUnited States0.8377358490566038
                                                                        TEXT0x1b05b80xc779HTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.29681778125917946
                                                                        TEXT0x1bcd340x236HTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4911660777385159
                                                                        TEXT0x1bcf6c0x56ASCII text, with CRLF line terminatorsEnglishUnited States0.6395348837209303
                                                                        TEXT0x1bcfc40x1c9ASCII text, with CRLF line terminatorsEnglishUnited States0.6258205689277899
                                                                        TEXT0x1bd1900x14bASCII text, with CRLF line terminatorsEnglishUnited States0.6374622356495468
                                                                        TEXT0x1bd2dc0x119eeASCII text, with very long lines (820)EnglishUnited States0.3407459750048494
                                                                        TEXT0x1ceccc0xc1ASCII text, with CRLF line terminatorsEnglishUnited States0.7409326424870466
                                                                        TEXT0x1ced900x124ASCII text, with CRLF line terminatorsEnglishUnited States0.7157534246575342
                                                                        UNICODEDATA0x1ceeb40x723fdata0.36769583205115053
                                                                        UNICODEDATA0x1d60f40x7ebddata0.42552011095700415
                                                                        UNICODEDATA0x1ddfb40x6a8data0.5985915492957746
                                                                        UNICODEDATA0x1de65c0xaf7ddata0.4191430161380078
                                                                        UNICODEDATA0x1e95dc0xd3cfdata0.4500857569666009
                                                                        UNICODEDATA0x1f69ac0x14c5data0.6482979123565921
                                                                        RT_CURSOR0x1f7e740x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
                                                                        RT_CURSOR0x1f7fa80x134dataEnglishUnited States0.4642857142857143
                                                                        RT_CURSOR0x1f80dc0x134dataEnglishUnited States0.4805194805194805
                                                                        RT_CURSOR0x1f82100x134dataEnglishUnited States0.38311688311688313
                                                                        RT_CURSOR0x1f83440x134dataEnglishUnited States0.36038961038961037
                                                                        RT_CURSOR0x1f84780x134dataEnglishUnited States0.4090909090909091
                                                                        RT_CURSOR0x1f85ac0x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4967532467532468
                                                                        RT_BITMAP0x1f86e00x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
                                                                        RT_BITMAP0x1f88b00x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 380EnglishUnited States0.46487603305785125
                                                                        RT_BITMAP0x1f8a940x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
                                                                        RT_BITMAP0x1f8c640x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39870689655172414
                                                                        RT_BITMAP0x1f8e340x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.4245689655172414
                                                                        RT_BITMAP0x1f90040x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5021551724137931
                                                                        RT_BITMAP0x1f91d40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5064655172413793
                                                                        RT_BITMAP0x1f93a40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
                                                                        RT_BITMAP0x1f95740x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5344827586206896
                                                                        RT_BITMAP0x1f97440x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
                                                                        RT_BITMAP0x1f99140xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.5208333333333334
                                                                        RT_BITMAP0x1f99d40xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.42857142857142855
                                                                        RT_BITMAP0x1f9ab40xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.4955357142857143
                                                                        RT_BITMAP0x1f9b940xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.38392857142857145
                                                                        RT_BITMAP0x1f9c740xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.4947916666666667
                                                                        RT_BITMAP0x1f9d340xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.484375
                                                                        RT_BITMAP0x1f9df40xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.42410714285714285
                                                                        RT_BITMAP0x1f9ed40xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.5104166666666666
                                                                        RT_BITMAP0x1f9f940xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.5
                                                                        RT_BITMAP0x1fa0740xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128EnglishUnited States0.4870689655172414
                                                                        RT_BITMAP0x1fa15c0xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.4895833333333333
                                                                        RT_BITMAP0x1fa21c0xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.3794642857142857
                                                                        RT_ICON0x1fa2fc0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.5184647302904565
                                                                        RT_ICON0x1fc8a40x4228Device independent bitmap graphic, 64 x 128 x 32, image size 0EnglishUnited States0.49120217288615964
                                                                        RT_ICON0x200acc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishUnited States0.723826714801444
                                                                        RT_ICON0x2013740x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishUnited States0.5657514450867052
                                                                        RT_DIALOG0x2018dc0x52data0.7682926829268293
                                                                        RT_DIALOG0x2019300x52data0.7560975609756098
                                                                        RT_STRING0x2019840x9cdata0.41025641025641024
                                                                        RT_STRING0x201a200x808data0.14688715953307394
                                                                        RT_STRING0x2022280x858data0.14887640449438203
                                                                        RT_STRING0x202a800x898data0.1390909090909091
                                                                        RT_STRING0x2033180x7a8data0.16887755102040816
                                                                        RT_STRING0x203ac00x944data0.12310286677908938
                                                                        RT_STRING0x2044040x9f4data0.12676609105180534
                                                                        RT_STRING0x204df80x5f0data0.3092105263157895
                                                                        RT_STRING0x2053e80x248data0.4160958904109589
                                                                        RT_STRING0x2056300x27cdata0.3663522012578616
                                                                        RT_STRING0x2058ac0x224data0.4635036496350365
                                                                        RT_STRING0x205ad00x45cdata0.3870967741935484
                                                                        RT_STRING0x205f2c0x414data0.39846743295019155
                                                                        RT_STRING0x2063400x314data0.3946700507614213
                                                                        RT_STRING0x2066540x424data0.42452830188679247
                                                                        RT_STRING0x206a780x21cdata0.5314814814814814
                                                                        RT_STRING0x206c940xc8data0.67
                                                                        RT_STRING0x206d5c0x18cdata0.5353535353535354
                                                                        RT_STRING0x206ee80x230data0.49642857142857144
                                                                        RT_STRING0x2071180x41cdata0.37927756653992395
                                                                        RT_STRING0x2075340x398data0.3815217391304348
                                                                        RT_STRING0x2078cc0x37cdata0.3968609865470852
                                                                        RT_STRING0x207c480x368data0.3394495412844037
                                                                        RT_STRING0x207fb00x43cdata0.3763837638376384
                                                                        RT_STRING0x2083ec0xccdata0.5392156862745098
                                                                        RT_STRING0x2084b80xb0data0.6534090909090909
                                                                        RT_STRING0x2085680x27cdata0.4716981132075472
                                                                        RT_STRING0x2087e40x3bcdata0.32426778242677823
                                                                        RT_STRING0x208ba00x368data0.37844036697247707
                                                                        RT_STRING0x208f080x2d4data0.39917127071823205
                                                                        RT_RCDATA0x2091dc0x5cdata0.782608695652174
                                                                        RT_RCDATA0x2092380x10data1.5
                                                                        RT_RCDATA0x2092480x7a0data0.5911885245901639
                                                                        RT_RCDATA0x2099e80x18dDelphi compiled form 'TdiffFrm'0.7581863979848866
                                                                        RT_RCDATA0x209b780x16a7Delphi compiled form 'TfilepropFrm'0.3386790826004484
                                                                        RT_RCDATA0x20b2200xcfdDelphi compiled form 'TfolderKindFrm'0.42857142857142855
                                                                        RT_RCDATA0x20bf200x370Delphi compiled form 'TipsEverFrm'0.5886363636363636
                                                                        RT_RCDATA0x20c2900x29dDelphi compiled form 'TlistSelectFrm'0.5919282511210763
                                                                        RT_RCDATA0x20c5300x3cfDelphi compiled form 'TlonginputFrm'0.556923076923077
                                                                        RT_RCDATA0x20c9000x13ff7Delphi compiled form 'TmainFrm'0.31347438073030487
                                                                        RT_RCDATA0x2208f80x419Delphi compiled form 'TnewuserpassFrm'0.47569113441372735
                                                                        RT_RCDATA0x220d140x2676Delphi compiled form 'ToptionsFrm'0.3191143611618932
                                                                        RT_RCDATA0x22338c0x396Delphi compiled form 'TpurgeFrm'0.5108932461873639
                                                                        RT_RCDATA0x2237240x363Delphi compiled form 'TrunScriptFrm'0.6147635524798154
                                                                        RT_RCDATA0x223a880x2fbDelphi compiled form 'TshellExtFrm'0.6120576671035387
                                                                        RT_GROUP_CURSOR0x223d840x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                                                                        RT_GROUP_CURSOR0x223d980x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                                                                        RT_GROUP_CURSOR0x223dac0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                        RT_GROUP_CURSOR0x223dc00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                        RT_GROUP_CURSOR0x223dd40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                        RT_GROUP_CURSOR0x223de80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                        RT_GROUP_CURSOR0x223dfc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                        RT_GROUP_ICON0x223e100x3edataEnglishUnited States0.8709677419354839
                                                                        RT_VERSION0x223e500x318dataItalianItaly0.4823232323232323
                                                                        RT_MANIFEST0x2241680x29fXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4977645305514158
                                                                        DLLImport
                                                                        oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                                                        advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                                                                        user32.dllGetKeyboardType, DestroyWindow, LoadStringA, MessageBoxA, CharNextA
                                                                        kernel32.dllGetACP, Sleep, VirtualFree, VirtualAlloc, GetTickCount, QueryPerformanceCounter, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, SetCurrentDirectoryA, RemoveDirectoryA, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetCurrentDirectoryA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, ExitThread, CreateThread, CompareStringA, WriteFile, UnhandledExceptionFilter, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetFileType, CreateFileA, CloseHandle
                                                                        kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
                                                                        user32.dllCreateWindowExA, WindowFromPoint, WaitMessage, ValidateRect, UpdateWindow, UnregisterClassA, UnionRect, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongW, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetKeyboardState, SetForegroundWindow, SetFocus, SetCursor, SetClipboardData, SetClassLongA, SetCaretPos, SetCapture, SetActiveWindow, SendMessageW, SendMessageA, SendDlgItemMessageA, ScrollWindowEx, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageW, PeekMessageA, OpenClipboard, OffsetRect, OemToCharBuffA, OemToCharA, MsgWaitForMultipleObjects, MessageBoxA, MessageBeep, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageW, IsDialogMessageA, IsClipboardFormatAvailable, IsChild, IsCharAlphaNumericA, IsCharAlphaA, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongW, GetWindowLongA, GetWindowDC, GetUpdateRect, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessageTime, GetMessagePos, GetMessageA, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameA, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDoubleClickTime, GetDlgItem, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameA, GetClassLongA, GetClassInfoA, GetCaretPos, GetCapture, GetAsyncKeyState, GetActiveWindow, FrameRect, FlashWindow, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EnumClipboardFormats, EnumChildWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageW, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DestroyCaret, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIconIndirect, CreateIcon, CreateCaret, CopyImage, CloseClipboard, ClientToScreen, ChildWindowFromPoint, CheckMenuItem, CharUpperBuffW, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerBuffA, CharLowerA, CharUpperBuffA, CharUpperA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
                                                                        msimg32.dllGradientFill
                                                                        gdi32.dllUnrealizeObject, StretchBlt, StartPage, StartDocA, SetWindowOrgEx, SetWindowExtEx, SetWinMetaFileBits, SetViewportOrgEx, SetViewportExtEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetMapMode, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SetAbortProc, SelectPalette, SelectObject, SelectClipRgn, SaveDC, RestoreDC, Rectangle, RectVisible, RealizePalette, Polyline, Polygon, PolyPolyline, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPointA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectType, GetObjectA, GetNearestPaletteIndex, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipRgn, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, ExtTextOutA, ExtCreatePen, ExcludeClipRect, EndPage, EndDoc, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreateRectRgn, CreatePenIndirect, CreatePalette, CreateICA, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateDCA, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, CombineRgn, BitBlt
                                                                        version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
                                                                        kernel32.dlllstrlenW, lstrcpynW, lstrcpyA, lstrcmpA, WriteFile, WideCharToMultiByte, WaitForSingleObject, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, TerminateProcess, Sleep, SizeofResource, SetThreadPriority, SetThreadLocale, SetLastError, SetFilePointer, SetFileAttributesA, SetEvent, SetErrorMode, SetEndOfFile, SetCurrentDirectoryA, ResumeThread, ResetEvent, ReadFile, QueryPerformanceFrequency, QueryPerformanceCounter, PeekNamedPipe, OutputDebugStringA, OpenProcess, MultiByteToWideChar, MulDiv, MoveFileA, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, IsBadReadPtr, InitializeCriticalSection, GlobalUnlock, GlobalSize, GlobalHandle, GlobalLock, GlobalGetAtomNameA, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetVersionExA, GetVersion, GetTimeZoneInformation, GetTickCount, GetThreadLocale, GetTempPathA, GetTempFileNameA, GetSystemInfo, GetStringTypeExA, GetStdHandle, GetProfileStringA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameW, GetFullPathNameA, GetFileTime, GetFileSize, GetFileAttributesA, GetExitCodeThread, GetExitCodeProcess, GetEnvironmentVariableA, GetDriveTypeA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetCPInfo, GetACP, FreeResource, InterlockedIncrement, InterlockedExchange, InterlockedDecrement, FreeLibrary, FormatMessageA, FindResourceA, FindNextFileA, FindFirstFileA, FindClose, FileTimeToSystemTime, FileTimeToLocalFileTime, FileTimeToDosDateTime, EnumCalendarInfoA, EnterCriticalSection, DeviceIoControl, DeleteFileA, DeleteCriticalSection, CreateThread, CreateProcessA, CreatePipe, CreateMutexA, CreateFileA, CreateEventA, CreateDirectoryA, CompareStringW, CompareStringA, CloseHandle
                                                                        advapi32.dllRegSetValueExA, RegQueryValueExW, RegQueryValueExA, RegQueryInfoKeyA, RegOpenKeyExW, RegOpenKeyExA, RegFlushKey, RegEnumValueA, RegEnumKeyExA, RegDeleteValueA, RegDeleteKeyA, RegCreateKeyExA, RegCloseKey
                                                                        kernel32.dllSleep
                                                                        oleaut32.dllGetErrorInfo, SysFreeString
                                                                        ole32.dllCoTaskMemFree, CoTaskMemAlloc, StringFromCLSID, CoCreateInstance, CoUninitialize, CoInitialize
                                                                        oleaut32.dllSafeArrayPtrOfIndex, SafeArrayPutElement, SafeArrayGetElement, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
                                                                        comctl32.dll_TrackMouseEvent, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_GetIcon, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create, InitCommonControls
                                                                        shell32.dllShell_NotifyIconA, ShellExecuteA, SHGetFileInfoA, SHFileOperationA, DragQueryFileA, DragAcceptFiles
                                                                        shell32.dllSHGetPathFromIDListA, SHGetMalloc, SHBrowseForFolderA
                                                                        winspool.drvOpenPrinterA, EnumPrintersA, DocumentPropertiesA, ClosePrinter
                                                                        comdlg32.dllChooseFontA, GetSaveFileNameA, GetOpenFileNameA
                                                                        winmm.dlltimeGetTime, PlaySoundA
                                                                        kernel32.dllGetVersionExA
                                                                        kernel32.dllMulDiv
                                                                        shell32.dll
                                                                        Language of compilation systemCountry where language is spokenMap
                                                                        EnglishUnited States
                                                                        ItalianItaly

                                                                        Download Network PCAP: filteredfull

                                                                        • Total Packets: 6
                                                                        • 80 (HTTP)
                                                                        • 53 (DNS)
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Dec 11, 2023 11:39:28.516691923 CET4973580192.168.2.494.23.66.84
                                                                        Dec 11, 2023 11:39:28.752262115 CET804973594.23.66.84192.168.2.4
                                                                        Dec 11, 2023 11:39:28.752521038 CET4973580192.168.2.494.23.66.84
                                                                        Dec 11, 2023 11:39:28.752737999 CET4973580192.168.2.494.23.66.84
                                                                        Dec 11, 2023 11:39:28.994066000 CET804973594.23.66.84192.168.2.4
                                                                        Dec 11, 2023 11:39:28.994096994 CET804973594.23.66.84192.168.2.4
                                                                        Dec 11, 2023 11:39:28.994112968 CET804973594.23.66.84192.168.2.4
                                                                        Dec 11, 2023 11:39:28.994380951 CET4973580192.168.2.494.23.66.84
                                                                        Dec 11, 2023 11:39:28.998044968 CET4973580192.168.2.494.23.66.84
                                                                        Dec 11, 2023 11:39:29.234411001 CET804973594.23.66.84192.168.2.4
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Dec 11, 2023 11:39:28.374033928 CET5192153192.168.2.41.1.1.1
                                                                        Dec 11, 2023 11:39:28.514339924 CET53519211.1.1.1192.168.2.4
                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                        Dec 11, 2023 11:39:28.374033928 CET192.168.2.41.1.1.10x71bStandard query (0)www.rejetto.comA (IP address)IN (0x0001)false
                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                        Dec 11, 2023 11:39:28.514339924 CET1.1.1.1192.168.2.40x71bNo error (0)www.rejetto.com94.23.66.84A (IP address)IN (0x0001)false
                                                                        • www.rejetto.com
                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        0192.168.2.44973594.23.66.84806616C:\Users\user\Desktop\hfs.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Dec 11, 2023 11:39:28.752737999 CET151OUTGET /hfs/hfs.updateinfo.txt HTTP/1.0
                                                                        Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, */*
                                                                        User-Agent: HFS/2.3m
                                                                        Host: www.rejetto.com
                                                                        Dec 11, 2023 11:39:28.994066000 CET536INHTTP/1.1 200 OK
                                                                        date: Mon, 11 Dec 2023 10:39:28 GMT
                                                                        content-type: text/plain
                                                                        content-length: 273
                                                                        server: Apache
                                                                        accept-ranges: bytes
                                                                        vary: Accept-Encoding
                                                                        pragma: no-cache
                                                                        cache-control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                                                        x-frame-options: SAMEORIGIN
                                                                        x-iplb-request-id: 668198D4:C247_5E174254:0050_6576E6E0_26B14:15D7
                                                                        x-iplb-instance: 52159
                                                                        connection: close
                                                                        Data Raw: 48 46 53 20 75 70 64 61 74 65 20 69 6e 66 6f 0d 0a 5b 6c 61 73 74 20 73 74 61 62 6c 65 5d 0d 0a 32 2e 33 6d 0d 0a 5b 6c 61 73 74 20 73 74 61 62 6c 65 20 62 75 69 6c 64 5d 0d 0a 33 30 30 0d 0a 5b 6c 61 73 74 20 73 74 61 62 6c 65 20 75 72 6c 5d 0d 0a 68 74 74 70 3a 2f 2f 77 77 77 2e 72 65 6a 65 74 74 6f 2e 63 6f 6d 2f 68 66 73 2f 64 6f 77 6e 6c 6f 61 64 0d 0a 5b 6c 61 73 74 20 75 6e 74 65 73 74 65 64 5d
                                                                        Data Ascii: HFS update info[last stable]2.3m[last stable build]300[last stable url]http://www.rejetto.com/hfs/download[last untested]
                                                                        Dec 11, 2023 11:39:28.994096994 CET138INData Raw: 0d 0a 32 2e 34 2e 30 20 52 43 36 0d 0a 5b 6c 61 73 74 20 75 6e 74 65 73 74 65 64 20 62 75 69 6c 64 5d 0d 0a 33 31 38 0d 0a 5b 6c 61 73 74 20 75 6e 74 65 73 74 65 64 20 75 72 6c 5d 0d 0a 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 63 6f 6d 2f 72
                                                                        Data Ascii: 2.4.0 RC6[last untested build]318[last untested url]https://github.com/rejetto/hfs2/releases/download/v2.4-rc06/hfs.exe[EOF]


                                                                        050100s020406080100

                                                                        Click to jump to process

                                                                        050100s0.005101520MB

                                                                        Click to jump to process

                                                                        • File
                                                                        • Registry
                                                                        • Network

                                                                        Click to dive into process behavior distribution

                                                                        Target ID:0
                                                                        Start time:11:38:15
                                                                        Start date:11/12/2023
                                                                        Path:C:\Users\user\Desktop\hfs.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Users\user\Desktop\hfs.exe
                                                                        Imagebase:0x400000
                                                                        File size:2'171'904 bytes
                                                                        MD5 hash:9E8557E98ED1269372FF0ACE91D63477
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:Borland Delphi
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000000.00000000.1644100619.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                        Reputation:low
                                                                        Has exited:false
                                                                        There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                                                                        Execution Graph

                                                                        Execution Coverage

                                                                        Dynamic/Packed Code Coverage

                                                                        Signature Coverage

                                                                        Execution Coverage:9.5%
                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                        Signature Coverage:22.9%
                                                                        Total number of Nodes:48
                                                                        Total number of Limit Nodes:3
                                                                        Show Legend
                                                                        Hide Nodes/Edges
                                                                        execution_graph 890 407f80 CreateMutexA 904 407ac0 905 407af5 TlsGetValue 904->905 906 407acf 904->906 907 407ada 905->907 908 407aff 905->908 912 407a7c 907->912 911 407aee 914 407a82 912->914 913 407aa6 TlsGetValue 913->911 914->913 918 407a68 LocalAlloc 914->918 916 407aa2 916->913 917 407ab2 TlsSetValue 916->917 917->913 918->916 891 407f46 CompareStringA 919 407ec6 RegCloseKey 920 407fc6 DeleteFileA 899 407b0c GetModuleHandleA 900 407b3f 899->900 901 407f0c RegQueryInfoKeyA 921 407fce DeviceIoControl 922 407ecf RegDeleteKeyA 893 407f56 CompareStringW 923 407fd6 RtlEnterCriticalSection 894 407f5e CreateDirectoryA 924 407ede RegDeleteValueA 925 407fde EnumCalendarInfoA 895 407f66 CreateEventA 926 407fe6 FileTimeToDosDateTime 902 407f27 RegSetValueExA 927 407eec RegFlushKey 896 407f6e CreateFileA 928 407fee FileTimeToLocalFileTime 929 407fae CreateProcessA 878 407070 879 407091 RegOpenKeyExA 878->879 880 4070b3 RegOpenKeyExA 879->880 883 4070f3 879->883 881 4070d1 RegOpenKeyExA 880->881 880->883 882 40717c GetLocaleInfoA 881->882 881->883 885 407296 882->885 886 4071b3 882->886 886->885 887 40724e LoadLibraryExA 886->887 887->885 888 407264 LoadLibraryExA 887->888 888->885 930 407fb6 CreateThread 897 407f7e 898 407f80 CreateMutexA 897->898 903 407f3e CloseHandle 931 407fbe RtlDeleteCriticalSection

                                                                        Executed Functions

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 0 407070-4070b1 RegOpenKeyExA 2 4070f3-407136 0->2 3 4070b3-4070cf RegOpenKeyExA 0->3 9 407138-407154 2->9 10 40715a-407174 2->10 3->2 4 4070d1-4070ed RegOpenKeyExA 3->4 4->2 5 40717c-4071ad GetLocaleInfoA 4->5 14 4071b3-4071b7 5->14 15 407296-40729d 5->15 9->10 16 407156 9->16 18 4071c3-4071d9 14->18 19 4071b9-4071bd 14->19 16->10 21 4071dc-4071df 18->21 19->15 19->18 22 4071e1-4071e9 21->22 23 4071eb-4071f3 21->23 22->23 24 4071db 22->24 23->15 25 4071f9-4071fe 23->25 24->21 26 407200-407226 25->26 27 407228-40722a 25->27 26->27 27->15 28 40722c-407230 27->28 28->15 30 407232-407262 LoadLibraryExA 28->30 30->15 33 407264-407294 LoadLibraryExA 30->33 33->15
                                                                        APIs
                                                                        • RegOpenKeyExA.KERNELBASE(80000001,Software\Borland\Locales,00000000,000F0019,?), ref: 004070AA
                                                                        • RegOpenKeyExA.KERNELBASE(80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 004070C8
                                                                        • RegOpenKeyExA.KERNELBASE(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 004070E6
                                                                        • GetLocaleInfoA.KERNELBASE(00000000), ref: 0040719F
                                                                        • LoadLibraryExA.KERNELBASE(00000000,00000000,00000002), ref: 00407259
                                                                        • LoadLibraryExA.KERNELBASE(00000000,00000000,00000002), ref: 0040728F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2896974617.0000000000407000.00000040.00000001.01000000.00000003.sdmp, Offset: 00407000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_407000_hfs.jbxd
                                                                        Similarity
                                                                        • API ID: Open$LibraryLoad$InfoLocale
                                                                        • String ID: .$Software\Borland\Delphi\Locales$Software\Borland\Locales
                                                                        • API String ID: 4041025014-3917250287
                                                                        • Opcode ID: 4bc055594a0b34e814b33aaf8fc9219e5e9fc34e973681e86cc46028133426e9
                                                                        • Instruction ID: c5ff98c6a6139f93c6704c79ab18b06f40684caa607cb0862b16daa4c1cf1b01
                                                                        • Opcode Fuzzy Hash: 4bc055594a0b34e814b33aaf8fc9219e5e9fc34e973681e86cc46028133426e9
                                                                        • Instruction Fuzzy Hash: 80517171E0420C7EFB21D6A49C46FEF77AC9B04744F4441B6BA04F66C2E678AE448B69
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 35 407f7e-407fa4 CreateMutexA
                                                                        APIs
                                                                        • CreateMutexA.KERNEL32(?,?,?), ref: 00407F97
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2896974617.0000000000407000.00000040.00000001.01000000.00000003.sdmp, Offset: 00407000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_407000_hfs.jbxd
                                                                        Similarity
                                                                        • API ID: CreateMutex
                                                                        • String ID:
                                                                        • API String ID: 1964310414-0
                                                                        • Opcode ID: aac90e20a50084a577ced6f325ddde7fae3f822483f87fcda839c5e40715e318
                                                                        • Instruction ID: c790e31c200fdd215013f6f20d056eb62fdbe26bf6d17a02c93ee99176357472
                                                                        • Opcode Fuzzy Hash: aac90e20a50084a577ced6f325ddde7fae3f822483f87fcda839c5e40715e318
                                                                        • Instruction Fuzzy Hash: 6BD05E73A14208FFCB00DFADDC05D9E73ECEB18254B108429F418D7100D239EA009B24
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 37 407f80-407fa4 CreateMutexA
                                                                        APIs
                                                                        • CreateMutexA.KERNEL32(?,?,?), ref: 00407F97
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2896974617.0000000000407000.00000040.00000001.01000000.00000003.sdmp, Offset: 00407000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_407000_hfs.jbxd
                                                                        Similarity
                                                                        • API ID: CreateMutex
                                                                        • String ID:
                                                                        • API String ID: 1964310414-0
                                                                        • Opcode ID: 485a42cfd74afe0bd6fd3a83a5c21534c4123a8668d01e8793639fac456bf432
                                                                        • Instruction ID: 349e1c842927ee80bb4e6aaef0f9b1f8cd2ec333b2a73608cae7dd49179f51a1
                                                                        • Opcode Fuzzy Hash: 485a42cfd74afe0bd6fd3a83a5c21534c4123a8668d01e8793639fac456bf432
                                                                        • Instruction Fuzzy Hash: 21D05E73914208FFCB00DFA9D805D8E73ECEB18254B108429F418D7100D239EA009B24
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 38 421970-421983 39 421985-42198a 38->39 40 42198d-4219b0 38->40 39->40 43 4219b2-4219dd 40->43 44 421a0b-421a11 40->44 46 4219e5-4219ff 43->46
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2896993520.0000000000421000.00000040.00000001.01000000.00000003.sdmp, Offset: 00421000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_421000_hfs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e65c068728c9befbfb0bd2696387d1c550580650a046a058749063818c853c7b
                                                                        • Instruction ID: d1efd2674946ddcb1477498d5fd98560e8a1a96f26c859c93cd1a0151d6e3682
                                                                        • Opcode Fuzzy Hash: e65c068728c9befbfb0bd2696387d1c550580650a046a058749063818c853c7b
                                                                        • Instruction Fuzzy Hash: EA115474E04648EFDB00DFA8D851AADFBF4EB45304F5180AAE504B7390D7355E41CB54
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 49 421b30-421b5c 50 421b5e-421b67 49->50 51 421bbf-421bd4 49->51 50->51 52 421b69-421bb4 call 421b30 call 421970 50->52 63 421bb9-421bbc 52->63 63->51
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2896993520.0000000000421000.00000040.00000001.01000000.00000003.sdmp, Offset: 00421000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_421000_hfs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4e97f87f3650c6f85148b80b62df0b5d7665720ffbccf451877ef4d4b30a3dd6
                                                                        • Instruction ID: 6589792cef98e809a9812f7c702a5b4da44f9991f1cefcbb9db66082a6a87442
                                                                        • Opcode Fuzzy Hash: 4e97f87f3650c6f85148b80b62df0b5d7665720ffbccf451877ef4d4b30a3dd6
                                                                        • Instruction Fuzzy Hash: 0D115E34A00148EFCB00DBA9D882D8DBBF5EF54304FA184A6E404E7661E774AF44CB59
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 64 421bea-421c28 66 421c2a call 421a14 64->66 67 421c2f-421c46 call 421b30 64->67 66->67 71 421c4b-421c53 67->71 72 421c55 call 421a7c 71->72 73 421c5a-421c6b 71->73 72->73 76 421c72 73->76 77 421c6d call 421ac4 73->77 77->76
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2896993520.0000000000421000.00000040.00000001.01000000.00000003.sdmp, Offset: 00421000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_421000_hfs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 4b6f4cad14f15868b6e16b35edbab0d0b0f9e8558c8b281c2a1114a9fb214b43
                                                                        • Instruction ID: 9d60802b55ce9ca12f46bf9c0685bb143f0351e90864b0859f2ecfdc362365b2
                                                                        • Opcode Fuzzy Hash: 4b6f4cad14f15868b6e16b35edbab0d0b0f9e8558c8b281c2a1114a9fb214b43
                                                                        • Instruction Fuzzy Hash: 9601F538B40294BED716AF66E8017ADBFF8EF2A700FD540E6E40052271DB395D41C61C
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 79 4213e8-421407 81 42142c-42143b 79->81 83 421409-42140c 81->83 84 42143d-421454 call 421044 81->84 87 421416-42141f 83->87 87->84 89 421421-421429 87->89 89->81
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2896993520.0000000000421000.00000040.00000001.01000000.00000003.sdmp, Offset: 00421000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_421000_hfs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9f64d00ef102ad1af902d2e05236edb25d0ea4c129a09f24e2c0ec02db4d65ab
                                                                        • Instruction ID: 8edcc4c43b3520b0e993df5f19bf5dbf676e64913b229a4b9fb3c6233d21f5cd
                                                                        • Opcode Fuzzy Hash: 9f64d00ef102ad1af902d2e05236edb25d0ea4c129a09f24e2c0ec02db4d65ab
                                                                        • Instruction Fuzzy Hash: 79F03C38704214FFC710EF55F95196977F8EB643147F18066F808A3662EA39AE02AB4C
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Non-executed Functions

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2896974617.0000000000407000.00000040.00000001.01000000.00000003.sdmp, Offset: 00407000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_407000_hfs.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f47502fed7009dd2242633c869eb6d4c5e6d7f210b0dba8c156ea9c0ec4b88f2
                                                                        • Instruction ID: c1fed7b65ea2b632cabae2a3fa9ac6ceb8095e1cb4539e7ca024ea703b2bd8d1
                                                                        • Opcode Fuzzy Hash: f47502fed7009dd2242633c869eb6d4c5e6d7f210b0dba8c156ea9c0ec4b88f2
                                                                        • Instruction Fuzzy Hash:
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%