Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
hfs.exe

Overview

General Information

Sample name:hfs.exe
Analysis ID:1580504
MD5:9e8557e98ed1269372ff0ace91d63477
SHA1:d0c4192b65e36553f6fd2b83f3123f6ae8380dac
SHA256:e678899d7ea9702184167b56655f91a69f8a0bdc9df65612762252c053c2cd7c
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Contains functionality to communicate with device drivers
Contains functionality to query locales information (e.g. system language)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • hfs.exe (PID: 6720 cmdline: "C:\Users\user\Desktop\hfs.exe" MD5: 9E8557E98ED1269372FF0ACE91D63477)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
hfs.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
    hfs.exeINDICATOR_TOOL_HFS_WebServerDetects HFS Web ServerditekSHen
    • 0x37ac:$s1: SOFTWARE\Borland\Delphi\
    • 0x11b120:$s2: C:\code\mine\hfs\scriptLib.pas
    • 0x125a40:$s2: C:\code\mine\hfs\scriptLib.pas
    • 0x126054:$s3: hfs.*;*.htm*;descript.ion;*.comment;*.md5;*.corrupted;*.lnk
    • 0x157cd5:$s3: hfs.*;*.htm*;descript.ion;*.comment;*.md5;*.corrupted;*.lnk
    • 0x157478:$s4: Server: HFS
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.1659053234.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
      SourceRuleDescriptionAuthorStrings
      0.0.hfs.exe.400000.0.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
        0.0.hfs.exe.400000.0.unpackINDICATOR_TOOL_HFS_WebServerDetects HFS Web ServerditekSHen
        • 0x37ac:$s1: SOFTWARE\Borland\Delphi\
        • 0x11b120:$s2: C:\code\mine\hfs\scriptLib.pas
        • 0x125a40:$s2: C:\code\mine\hfs\scriptLib.pas
        • 0x126054:$s3: hfs.*;*.htm*;descript.ion;*.comment;*.md5;*.corrupted;*.lnk
        • 0x157cd5:$s3: hfs.*;*.htm*;descript.ion;*.comment;*.md5;*.corrupted;*.lnk
        • 0x157478:$s4: Server: HFS
        No Sigma rule has matched
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: http://rejetto.webfactional.com/hfs/ip.phpAvira URL Cloud: Label: malware
        Source: hfs.exeReversingLabs: Detection: 18%
        Source: hfs.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET /hfs/hfs.updateinfo.txt HTTP/1.0Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, */*User-Agent: HFS/2.3mHost: www.rejetto.com
        Source: global trafficDNS traffic detected: DNS query: www.rejetto.com
        Source: hfs.exe, 00000000.00000003.1661844100.000000000078F000.00000004.00000020.00020000.00000000.sdmp, hfs.exe, 00000000.00000002.2925945040.00000000049B3000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: HTTP://TRENTRICHARDSON.COM
        Source: hfs.exe, 00000000.00000003.1661844100.000000000078F000.00000004.00000020.00020000.00000000.sdmp, hfs.exe, 00000000.00000002.2925945040.00000000049B3000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: HTTP://TRENTRICHARDSON.COM/IMPROMPTU/GPL-LICENSE.TXT
        Source: hfs.exe, 00000000.00000003.1661844100.000000000078F000.00000004.00000020.00020000.00000000.sdmp, hfs.exe, 00000000.00000002.2925945040.00000000049B3000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: HTTP://TRENTRICHARDSON.COM/IMPROMPTU/MIT-LICENSE.TXT
        Source: hfs.exe, 00000000.00000002.2925945040.00000000049B3000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: HTTP://WWW.REJETTO.COM/HFS/
        Source: hfs.exe, 00000000.00000002.2925945040.0000000004A09000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: HTTPS://GITHUB.COM/REJETTO/HFS2/RELEASES/DOWNLOAD/V2.4-RC07/HFS.EXE
        Source: hfs.exe, 00000000.00000002.2925197366.00000000023AA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://192.168.2.4/
        Source: hfs.exe, 00000000.00000002.2924795973.000000000019A000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://192.168.2.4/5
        Source: hfs.exe, 00000000.00000002.2924982194.000000000074F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.168.2.4/LF
        Source: hfs.exeString found in binary or memory: http://2ip.ru
        Source: hfs.exeString found in binary or memory: http://checkip.dyndns.org
        Source: hfs.exeString found in binary or memory: http://hfsservice.rejetto.com/ipservices.php
        Source: hfs.exeString found in binary or memory: http://hfstest.rejetto.com/?port=
        Source: hfs.exeString found in binary or memory: http://jquery.com/
        Source: hfs.exeString found in binary or memory: http://jquery.org/license
        Source: hfs.exeString found in binary or memory: http://rejetto.webfactional.com/hfs/ip.php
        Source: hfs.exeString found in binary or memory: http://sizzlejs.com/
        Source: hfs.exeString found in binary or memory: http://trentrichardson.com
        Source: hfs.exeString found in binary or memory: http://trentrichardson.com/Impromptu/GPL-LICENSE.txt
        Source: hfs.exeString found in binary or memory: http://trentrichardson.com/Impromptu/MIT-LICENSE.txt
        Source: hfs.exeString found in binary or memory: http://www.alexnolan.net/ip/
        Source: hfs.exeString found in binary or memory: http://www.canyouseeme.org
        Source: hfs.exeString found in binary or memory: http://www.cjb.net/cgi-bin/dynip.cgi?username=
        Source: hfs.exeString found in binary or memory: http://www.mario-online.com/mio_indirizzo_ip.php
        Source: hfs.exeString found in binary or memory: http://www.melauto.it/public/rejetto/ip.php
        Source: hfs.exeString found in binary or memory: http://www.rejetto.com/forum/
        Source: hfs.exeString found in binary or memory: http://www.rejetto.com/forum/U
        Source: hfs.exeString found in binary or memory: http://www.rejetto.com/hfs-donate
        Source: hfs.exeString found in binary or memory: http://www.rejetto.com/hfs-donateU
        Source: hfs.exeString found in binary or memory: http://www.rejetto.com/hfs/
        Source: hfs.exeString found in binary or memory: http://www.rejetto.com/hfs/U
        Source: hfs.exeString found in binary or memory: http://www.rejetto.com/hfs/guide/
        Source: hfs.exeString found in binary or memory: http://www.rejetto.com/hfs/guide/U
        Source: hfs.exeString found in binary or memory: http://www.rejetto.com/hfs/guide/intro.html
        Source: hfs.exeString found in binary or memory: http://www.rejetto.com/hfs/guide/intro.htmlU
        Source: hfs.exeString found in binary or memory: http://www.rejetto.com/hfs/hfs.updateinfo.txt
        Source: hfs.exeString found in binary or memory: http://www.rejetto.com/sw/?faq=hfs
        Source: hfs.exeString found in binary or memory: http://www.rejetto.com/sw/?faq=hfsU
        Source: hfs.exeString found in binary or memory: http://www.rejetto.com/sw/license.txt
        Source: hfs.exeString found in binary or memory: http://www.rejetto.com/sw/license.txtU
        Source: hfs.exeString found in binary or memory: http://www.rejetto.com/wiki/?title=HFS:_Event_scripts
        Source: hfs.exeString found in binary or memory: http://www.whatsmyrealip.com/
        Source: hfs.exe, 00000000.00000002.2925197366.0000000002362000.00000004.00001000.00020000.00000000.sdmp, hfs.exe, 00000000.00000002.2925945040.0000000004A09000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/rejetto/hfs2/releases/download/v2.4-rc07/hfs.exe

        System Summary

        barindex
        Source: hfs.exe, type: SAMPLEMatched rule: Detects HFS Web Server Author: ditekSHen
        Source: 0.0.hfs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects HFS Web Server Author: ditekSHen
        Source: C:\Users\user\Desktop\hfs.exeCode function: 0_2_00407FCE: DeviceIoControl,0_2_00407FCE
        Source: hfs.exe, 00000000.00000000.1659053234.0000000000401000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename vs hfs.exe
        Source: hfs.exeBinary or memory string: OriginalFilename vs hfs.exe
        Source: hfs.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: hfs.exe, type: SAMPLEMatched rule: INDICATOR_TOOL_HFS_WebServer author = ditekSHen, description = Detects HFS Web Server
        Source: 0.0.hfs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_TOOL_HFS_WebServer author = ditekSHen, description = Detects HFS Web Server
        Source: hfs.exeBinary string: @\??\C:\Device\LanmanRedirector\U
        Source: classification engineClassification label: mal64.winEXE@1/0@1/1
        Source: C:\Users\user\Desktop\hfs.exeFile created: C:\Users\user\Desktop\test.tmp~1466682296.tmpJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeMutant created: \Sessions\1\BaseNamedObjects\HttpFileServer
        Source: Yara matchFile source: hfs.exe, type: SAMPLE
        Source: Yara matchFile source: 0.0.hfs.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000000.00000000.1659053234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
        Source: C:\Users\user\Desktop\hfs.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeFile read: C:\Windows\win.iniJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: hfs.exeReversingLabs: Detection: 18%
        Source: hfs.exeString found in binary or memory: /Address family not supported by protocol family
        Source: hfs.exeString found in binary or memory: %number-addresses%
        Source: hfs.exeString found in binary or memory: %number-addresses-ever%
        Source: hfs.exeString found in binary or memory: %number-addresses-downloading%
        Source: hfs.exeString found in binary or memory: %item-added-dt%
        Source: hfs.exeString found in binary or memory: %item-added%
        Source: hfs.exeString found in binary or memory: log-server-start=
        Source: hfs.exeString found in binary or memory: log-server-stop=
        Source: hfs.exeString found in binary or memory: reload-on-startup=
        Source: hfs.exeString found in binary or memory: find-external-on-startup=
        Source: hfs.exeString found in binary or memory: do-not-log-address=
        Source: hfs.exeString found in binary or memory: last-external-address=
        Source: hfs.exeString found in binary or memory: copy-url-on-start=
        Source: hfs.exeString found in binary or memory: copy-url-on-addition=
        Source: hfs.exeString found in binary or memory: log-server-start
        Source: hfs.exeString found in binary or memory: log-server-stop
        Source: hfs.exeString found in binary or memory: copy-url-on-addition
        Source: hfs.exeString found in binary or memory: copy-url-on-start
        Source: hfs.exeString found in binary or memory: reload-on-startup
        Source: hfs.exeString found in binary or memory: find-external-on-startup
        Source: hfs.exeString found in binary or memory: do-not-log-address
        Source: hfs.exeString found in binary or memory: last-external-address
        Source: hfs.exeString found in binary or memory: -START "" /WAIT "%s" -q
        Source: hfs.exeString found in binary or memory: }//addPagingButton
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: msimg32.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: windowscodecs.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: riched32.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: riched20.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: usp10.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: msls31.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: dataexchange.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: d3d11.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: dcomp.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: dxgi.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: twinapi.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: wsock32.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: napinsp.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: pnrpnsp.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: wshbth.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: nlaapi.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: winrnr.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9FC8E510-A27C-4B3B-B9A3-BF65F00256A8}\InProcServer32Jump to behavior
        Source: C:\Users\user\Desktop\hfs.exeWindow found: window name: TButtonJump to behavior
        Source: C:\Users\user\Desktop\hfs.exeFile opened: C:\Windows\SysWOW64\RICHED32.DLLJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: hfs.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
        Source: hfs.exeStatic file information: File size 2171904 > 1048576
        Source: hfs.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x176800
        Source: C:\Users\user\Desktop\hfs.exeCode function: 0_2_004079E6 push 00407A43h; ret 0_2_00407A3B
        Source: C:\Users\user\Desktop\hfs.exeCode function: 0_2_004079E8 push 00407A43h; ret 0_2_00407A3B
        Source: C:\Users\user\Desktop\hfs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: hfs.exe, 00000000.00000002.2924982194.000000000078E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll9Zcj
        Source: C:\Users\user\Desktop\hfs.exeCode function: RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,GetLocaleInfoA,LoadLibraryExA,LoadLibraryExA,0_2_00407070
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
        Command and Scripting Interpreter
        1
        DLL Side-Loading
        1
        DLL Side-Loading
        1
        Masquerading
        OS Credential Dumping1
        Security Software Discovery
        Remote ServicesData from Local System2
        Non-Application Layer Protocol
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
        DLL Side-Loading
        LSASS Memory1
        File and Directory Discovery
        Remote Desktop ProtocolData from Removable Media2
        Application Layer Protocol
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
        Obfuscated Files or Information
        Security Account Manager11
        System Information Discovery
        SMB/Windows Admin SharesData from Network Shared Drive1
        Ingress Tool Transfer
        Automated ExfiltrationData Encrypted for Impact
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        hfs.exe18%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://www.rejetto.com/hfs/guide/intro.html0%Avira URL Cloudsafe
        http://www.rejetto.com/wiki/?title=HFS:_Event_scripts0%Avira URL Cloudsafe
        http://www.rejetto.com/hfs/hfs.updateinfo.txt0%Avira URL Cloudsafe
        http://www.alexnolan.net/ip/0%Avira URL Cloudsafe
        http://192.168.2.4/0%Avira URL Cloudsafe
        http://192.168.2.4/LF0%Avira URL Cloudsafe
        HTTP://WWW.REJETTO.COM/HFS/0%Avira URL Cloudsafe
        http://www.rejetto.com/sw/?faq=hfsU0%Avira URL Cloudsafe
        http://www.cjb.net/cgi-bin/dynip.cgi?username=0%Avira URL Cloudsafe
        http://www.rejetto.com/hfs/U0%Avira URL Cloudsafe
        http://192.168.2.4/50%Avira URL Cloudsafe
        HTTP://TRENTRICHARDSON.COM/IMPROMPTU/GPL-LICENSE.TXT0%Avira URL Cloudsafe
        http://rejetto.webfactional.com/hfs/ip.php100%Avira URL Cloudmalware
        http://www.rejetto.com/hfs/guide/intro.htmlU0%Avira URL Cloudsafe
        http://www.rejetto.com/sw/license.txt0%Avira URL Cloudsafe
        http://www.melauto.it/public/rejetto/ip.php0%Avira URL Cloudsafe
        http://www.rejetto.com/sw/license.txtU0%Avira URL Cloudsafe
        http://www.rejetto.com/hfs/guide/U0%Avira URL Cloudsafe
        http://www.mario-online.com/mio_indirizzo_ip.php0%Avira URL Cloudsafe
        http://www.rejetto.com/hfs-donateU0%Avira URL Cloudsafe
        http://trentrichardson.com/Impromptu/MIT-LICENSE.txt0%Avira URL Cloudsafe
        http://hfsservice.rejetto.com/ipservices.php0%Avira URL Cloudsafe
        http://www.rejetto.com/hfs-donate0%Avira URL Cloudsafe
        http://www.rejetto.com/forum/0%Avira URL Cloudsafe
        http://www.rejetto.com/hfs/guide/0%Avira URL Cloudsafe
        http://hfstest.rejetto.com/?port=0%Avira URL Cloudsafe
        http://www.rejetto.com/sw/?faq=hfs0%Avira URL Cloudsafe
        http://www.rejetto.com/forum/U0%Avira URL Cloudsafe
        HTTP://TRENTRICHARDSON.COM0%Avira URL Cloudsafe
        http://www.whatsmyrealip.com/0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        www.rejetto.com
        94.23.66.84
        truefalse
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          HTTP://WWW.REJETTO.COM/HFS/hfs.exe, 00000000.00000002.2925945040.00000000049B3000.00000004.00001000.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.canyouseeme.orghfs.exefalse
            high
            http://jquery.org/licensehfs.exefalse
              high
              http://www.rejetto.com/hfs/guide/intro.htmlhfs.exefalse
              • Avira URL Cloud: safe
              unknown
              http://192.168.2.4/hfs.exe, 00000000.00000002.2925197366.00000000023AA000.00000004.00001000.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://192.168.2.4/LFhfs.exe, 00000000.00000002.2924982194.000000000074F000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.cjb.net/cgi-bin/dynip.cgi?username=hfs.exefalse
              • Avira URL Cloud: safe
              unknown
              http://www.rejetto.com/wiki/?title=HFS:_Event_scriptshfs.exefalse
              • Avira URL Cloud: safe
              unknown
              http://www.alexnolan.net/ip/hfs.exefalse
              • Avira URL Cloud: safe
              unknown
              http://sizzlejs.com/hfs.exefalse
                high
                http://www.rejetto.com/sw/?faq=hfsUhfs.exefalse
                • Avira URL Cloud: safe
                unknown
                http://www.rejetto.com/hfs/Uhfs.exefalse
                • Avira URL Cloud: safe
                unknown
                http://www.rejetto.com/hfs/hfs.updateinfo.txthfs.exefalse
                • Avira URL Cloud: safe
                unknown
                HTTP://TRENTRICHARDSON.COM/IMPROMPTU/GPL-LICENSE.TXThfs.exe, 00000000.00000003.1661844100.000000000078F000.00000004.00000020.00020000.00000000.sdmp, hfs.exe, 00000000.00000002.2925945040.00000000049B3000.00000004.00001000.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.rejetto.com/hfs/guide/Uhfs.exefalse
                • Avira URL Cloud: safe
                unknown
                http://checkip.dyndns.orghfs.exefalse
                  high
                  http://192.168.2.4/5hfs.exe, 00000000.00000002.2924795973.000000000019A000.00000004.00000010.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://rejetto.webfactional.com/hfs/ip.phphfs.exefalse
                  • Avira URL Cloud: malware
                  unknown
                  http://www.rejetto.com/hfs/guide/intro.htmlUhfs.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.melauto.it/public/rejetto/ip.phphfs.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.rejetto.com/hfs-donateUhfs.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.mario-online.com/mio_indirizzo_ip.phphfs.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  https://github.com/rejetto/hfs2/releases/download/v2.4-rc07/hfs.exehfs.exe, 00000000.00000002.2925197366.0000000002362000.00000004.00001000.00020000.00000000.sdmp, hfs.exe, 00000000.00000002.2925945040.0000000004A09000.00000004.00001000.00020000.00000000.sdmpfalse
                    high
                    http://www.rejetto.com/sw/license.txthfs.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.rejetto.com/hfs/hfs.exefalse
                      unknown
                      http://www.rejetto.com/sw/license.txtUhfs.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      HTTPS://GITHUB.COM/REJETTO/HFS2/RELEASES/DOWNLOAD/V2.4-RC07/HFS.EXEhfs.exe, 00000000.00000002.2925945040.0000000004A09000.00000004.00001000.00020000.00000000.sdmpfalse
                        high
                        http://trentrichardson.com/Impromptu/GPL-LICENSE.txthfs.exefalse
                          unknown
                          http://trentrichardson.com/Impromptu/MIT-LICENSE.txthfs.exefalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.rejetto.com/forum/hfs.exefalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.rejetto.com/hfs-donatehfs.exefalse
                          • Avira URL Cloud: safe
                          unknown
                          HTTP://TRENTRICHARDSON.COM/IMPROMPTU/MIT-LICENSE.TXThfs.exe, 00000000.00000003.1661844100.000000000078F000.00000004.00000020.00020000.00000000.sdmp, hfs.exe, 00000000.00000002.2925945040.00000000049B3000.00000004.00001000.00020000.00000000.sdmpfalse
                            unknown
                            http://2ip.ruhfs.exefalse
                              high
                              http://hfsservice.rejetto.com/ipservices.phphfs.exefalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.rejetto.com/hfs/guide/hfs.exefalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.rejetto.com/forum/Uhfs.exefalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.whatsmyrealip.com/hfs.exefalse
                              • Avira URL Cloud: safe
                              unknown
                              HTTP://TRENTRICHARDSON.COMhfs.exe, 00000000.00000003.1661844100.000000000078F000.00000004.00000020.00020000.00000000.sdmp, hfs.exe, 00000000.00000002.2925945040.00000000049B3000.00000004.00001000.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://trentrichardson.comhfs.exefalse
                                unknown
                                http://hfstest.rejetto.com/?port=hfs.exefalse
                                • Avira URL Cloud: safe
                                unknown
                                http://jquery.com/hfs.exefalse
                                  high
                                  http://www.rejetto.com/sw/?faq=hfshfs.exefalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  94.23.66.84
                                  www.rejetto.comFrance
                                  16276OVHFRfalse
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1580504
                                  Start date and time:2024-12-24 19:48:31 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 3m 54s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:5
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:hfs.exe
                                  Detection:MAL
                                  Classification:mal64.winEXE@1/0@1/1
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HCA Information:
                                  • Successful, ratio: 100%
                                  • Number of executed functions: 7
                                  • Number of non-executed functions: 1
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                  • Excluded IPs from analysis (whitelisted): 52.149.20.212, 13.107.246.63
                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  • VT rate limit hit for: hfs.exe
                                  No simulations
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  94.23.66.84hfs.exeGet hashmaliciousUnknownBrowse
                                  • www.rejetto.com/hfs/download
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  www.rejetto.comMDE_File_Sample_d0c4192b65e36553f6fd2b83f3123f6ae8380dac.zipGet hashmaliciousUnknownBrowse
                                  • 94.23.66.84
                                  hfs.exeGet hashmaliciousUnknownBrowse
                                  • 94.23.66.84
                                  ijxxKAiHHB.exeGet hashmaliciousUnknownBrowse
                                  • 185.20.49.7
                                  hfs.exeGet hashmaliciousUnknownBrowse
                                  • 185.20.49.7
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  OVHFRarmv5l.elfGet hashmaliciousMiraiBrowse
                                  • 139.99.86.60
                                  nklarm7.elfGet hashmaliciousUnknownBrowse
                                  • 91.121.98.217
                                  jklm68k.elfGet hashmaliciousUnknownBrowse
                                  • 139.99.246.133
                                  splmips.elfGet hashmaliciousUnknownBrowse
                                  • 94.23.162.140
                                  jklmips.elfGet hashmaliciousUnknownBrowse
                                  • 192.99.129.83
                                  armv7l.elfGet hashmaliciousUnknownBrowse
                                  • 51.71.12.108
                                  nTyPEbq9wQ.lnkGet hashmaliciousUnknownBrowse
                                  • 139.99.188.124
                                  7A2lfjTYNf.lnkGet hashmaliciousUnknownBrowse
                                  • 139.99.188.124
                                  6fW0guYpsH.lnkGet hashmaliciousUnknownBrowse
                                  • 139.99.188.124
                                  x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                  • 149.202.242.118
                                  No context
                                  No context
                                  No created / dropped files found
                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Entropy (8bit):6.57278230008726
                                  TrID:
                                  • Win32 Executable (generic) a (10002005/4) 99.53%
                                  • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
                                  • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                  • DOS Executable Generic (2002/1) 0.02%
                                  File name:hfs.exe
                                  File size:2'171'904 bytes
                                  MD5:9e8557e98ed1269372ff0ace91d63477
                                  SHA1:d0c4192b65e36553f6fd2b83f3123f6ae8380dac
                                  SHA256:e678899d7ea9702184167b56655f91a69f8a0bdc9df65612762252c053c2cd7c
                                  SHA512:c1a338c0414ac68d7ce24df06f3b665a56feae15063332324fea3250f1e77c19209ea3d89fe3a06d48974cce70bd9c65d59b7e2fbaf27c3f01ac2e898057e9ec
                                  SSDEEP:49152:UR0LvNmmh9otEKMx9XSNVBOw+V4UvEbAThhiqvyo98ZcW7SZ:UR0xmmh9GEKgpSNVBr72QN
                                  TLSH:ECA56B22F690C437D17736799CA793C56928BB502E14990B3AE87F4CBF793C13D1229A
                                  File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                  Icon Hash:1b3b13333101860c
                                  Entrypoint:0x579ca0
                                  Entrypoint Section:.itext
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                  DLL Characteristics:NX_COMPAT
                                  Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:eb58f6a65d91e853b4dcfa5f6c10386b
                                  Instruction
                                  push ebp
                                  mov ebp, esp
                                  add esp, FFFFFFECh
                                  push ebx
                                  xor eax, eax
                                  mov dword ptr [ebp-14h], eax
                                  mov eax, 005771F0h
                                  call 00007F953C9BA54Bh
                                  mov ebx, dword ptr [00582958h]
                                  xor eax, eax
                                  push ebp
                                  push 00579E14h
                                  push dword ptr fs:[eax]
                                  mov dword ptr fs:[eax], esp
                                  mov eax, dword ptr [005825DCh]
                                  mov eax, dword ptr [eax]
                                  mov dword ptr [eax+14h], 0057704Ch
                                  push 00000011h
                                  call 00007F953C9BB1C6h
                                  movsx eax, ax
                                  test ah, FFFFFF80h
                                  jne 00007F953CB2C75Eh
                                  mov eax, dword ptr [005825DCh]
                                  mov eax, dword ptr [eax]
                                  mov edx, 00579E2Ch
                                  call 00007F953CA43F7Dh
                                  test al, al
                                  jne 00007F953CB2C722h
                                  mov eax, dword ptr [005825DCh]
                                  mov eax, dword ptr [eax]
                                  mov ecx, dword ptr [eax+0Ch]
                                  lea eax, dword ptr [ebp-14h]
                                  mov edx, 00579E44h
                                  call 00007F953C9B8162h
                                  mov eax, dword ptr [ebp-14h]
                                  xor ecx, ecx
                                  mov edx, 00000010h
                                  call 00007F953CAC49FFh
                                  mov eax, 00000001h
                                  call 00007F953C9B7D4Dh
                                  mov eax, dword ptr [005825DCh]
                                  mov eax, dword ptr [eax]
                                  cmp byte ptr [eax+08h], 00000000h
                                  jne 00007F953CB2C70Ch
                                  call 00007F953CB29A9Bh
                                  test al, al
                                  je 00007F953CB2C703h
                                  mov eax, dword ptr [005825DCh]
                                  mov eax, dword ptr [eax]
                                  call 00007F953CA43FFFh
                                  jmp 00007F953CB2C7A0h
                                  mov eax, dword ptr [ebx]
                                  call 00007F953CA4208Bh
                                  mov eax, dword ptr [00582A14h]
                                  mov eax, dword ptr [eax]
                                  mov dl, 01h
                                  call 00007F953CA58825h
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x1910000x3966.idata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x1ad0000x77600.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x1970000x15764.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x1960180x2d.rdata
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x1960000x18.rdata
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x191acc0x8d8.idata
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000x1766b80x1768003f942d6c37616e0d8d9ac5fd5876e441False0.46303404539385845data6.429015159978142IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .itext0x1780000x1e640x2000f4582be31f56c88cbd18ab7ba9099d38False0.549072265625data6.18976186886786IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .data0x17a0000x8c940x8e009f9a41de15042165e91ffa796cbd7dc1False0.5568056778169014data5.687851591548669IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .bss0x1830000xd9740x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .idata0x1910000x39660x3a0087db3a2d95e6a0a244ebc9dc6a2f460dFalse0.31276939655172414data5.164467768035724IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .tls0x1950000x440x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .rdata0x1960000x450x200c7f385b277b29965aeda94ad0884ecccFalse0.142578125data0.9956758247090713IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x1970000x157640x15800eec81278c172ce8dcc7aa4a87e5d3dd7False0.5875726744186046data6.701161684807333IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  .rsrc0x1ad0000x776000x77600e474116bbf0bad0c701fe37e23c3c0d9False0.3714721040575916data5.963918185992459IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  GIF0x1aea000x179eGIF image data, version 89a, 387 x 169EnglishUnited States1.0018193847171684
                                  TEXT0x1b01a00x30bASCII text, with CRLF line terminatorsEnglishUnited States0.4672657252888318
                                  TEXT0x1b04ac0x109ASCII text, with CRLF line terminatorsEnglishUnited States0.8377358490566038
                                  TEXT0x1b05b80xc779HTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.29681778125917946
                                  TEXT0x1bcd340x236HTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4911660777385159
                                  TEXT0x1bcf6c0x56ASCII text, with CRLF line terminatorsEnglishUnited States0.6395348837209303
                                  TEXT0x1bcfc40x1c9ASCII text, with CRLF line terminatorsEnglishUnited States0.6258205689277899
                                  TEXT0x1bd1900x14bASCII text, with CRLF line terminatorsEnglishUnited States0.6374622356495468
                                  TEXT0x1bd2dc0x119eeASCII text, with very long lines (820)EnglishUnited States0.3407459750048494
                                  TEXT0x1ceccc0xc1ASCII text, with CRLF line terminatorsEnglishUnited States0.7409326424870466
                                  TEXT0x1ced900x124ASCII text, with CRLF line terminatorsEnglishUnited States0.7157534246575342
                                  UNICODEDATA0x1ceeb40x723fdata0.36769583205115053
                                  UNICODEDATA0x1d60f40x7ebddata0.42552011095700415
                                  UNICODEDATA0x1ddfb40x6a8data0.5985915492957746
                                  UNICODEDATA0x1de65c0xaf7ddata0.4191430161380078
                                  UNICODEDATA0x1e95dc0xd3cfdata0.4500857569666009
                                  UNICODEDATA0x1f69ac0x14c5data0.6482979123565921
                                  RT_CURSOR0x1f7e740x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
                                  RT_CURSOR0x1f7fa80x134dataEnglishUnited States0.4642857142857143
                                  RT_CURSOR0x1f80dc0x134dataEnglishUnited States0.4805194805194805
                                  RT_CURSOR0x1f82100x134dataEnglishUnited States0.38311688311688313
                                  RT_CURSOR0x1f83440x134dataEnglishUnited States0.36038961038961037
                                  RT_CURSOR0x1f84780x134dataEnglishUnited States0.4090909090909091
                                  RT_CURSOR0x1f85ac0x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4967532467532468
                                  RT_BITMAP0x1f86e00x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
                                  RT_BITMAP0x1f88b00x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 380EnglishUnited States0.46487603305785125
                                  RT_BITMAP0x1f8a940x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
                                  RT_BITMAP0x1f8c640x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39870689655172414
                                  RT_BITMAP0x1f8e340x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.4245689655172414
                                  RT_BITMAP0x1f90040x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5021551724137931
                                  RT_BITMAP0x1f91d40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5064655172413793
                                  RT_BITMAP0x1f93a40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
                                  RT_BITMAP0x1f95740x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5344827586206896
                                  RT_BITMAP0x1f97440x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
                                  RT_BITMAP0x1f99140xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.5208333333333334
                                  RT_BITMAP0x1f99d40xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.42857142857142855
                                  RT_BITMAP0x1f9ab40xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.4955357142857143
                                  RT_BITMAP0x1f9b940xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.38392857142857145
                                  RT_BITMAP0x1f9c740xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.4947916666666667
                                  RT_BITMAP0x1f9d340xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.484375
                                  RT_BITMAP0x1f9df40xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.42410714285714285
                                  RT_BITMAP0x1f9ed40xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.5104166666666666
                                  RT_BITMAP0x1f9f940xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.5
                                  RT_BITMAP0x1fa0740xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128EnglishUnited States0.4870689655172414
                                  RT_BITMAP0x1fa15c0xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.4895833333333333
                                  RT_BITMAP0x1fa21c0xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.3794642857142857
                                  RT_ICON0x1fa2fc0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.5184647302904565
                                  RT_ICON0x1fc8a40x4228Device independent bitmap graphic, 64 x 128 x 32, image size 0EnglishUnited States0.49120217288615964
                                  RT_ICON0x200acc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishUnited States0.723826714801444
                                  RT_ICON0x2013740x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishUnited States0.5657514450867052
                                  RT_DIALOG0x2018dc0x52data0.7682926829268293
                                  RT_DIALOG0x2019300x52data0.7560975609756098
                                  RT_STRING0x2019840x9cdata0.41025641025641024
                                  RT_STRING0x201a200x808data0.14688715953307394
                                  RT_STRING0x2022280x858data0.14887640449438203
                                  RT_STRING0x202a800x898data0.1390909090909091
                                  RT_STRING0x2033180x7a8data0.16887755102040816
                                  RT_STRING0x203ac00x944data0.12310286677908938
                                  RT_STRING0x2044040x9f4data0.12676609105180534
                                  RT_STRING0x204df80x5f0data0.3092105263157895
                                  RT_STRING0x2053e80x248data0.4160958904109589
                                  RT_STRING0x2056300x27cdata0.3663522012578616
                                  RT_STRING0x2058ac0x224data0.4635036496350365
                                  RT_STRING0x205ad00x45cdata0.3870967741935484
                                  RT_STRING0x205f2c0x414data0.39846743295019155
                                  RT_STRING0x2063400x314data0.3946700507614213
                                  RT_STRING0x2066540x424data0.42452830188679247
                                  RT_STRING0x206a780x21cdata0.5314814814814814
                                  RT_STRING0x206c940xc8data0.67
                                  RT_STRING0x206d5c0x18cdata0.5353535353535354
                                  RT_STRING0x206ee80x230data0.49642857142857144
                                  RT_STRING0x2071180x41cdata0.37927756653992395
                                  RT_STRING0x2075340x398data0.3815217391304348
                                  RT_STRING0x2078cc0x37cdata0.3968609865470852
                                  RT_STRING0x207c480x368data0.3394495412844037
                                  RT_STRING0x207fb00x43cdata0.3763837638376384
                                  RT_STRING0x2083ec0xccdata0.5392156862745098
                                  RT_STRING0x2084b80xb0data0.6534090909090909
                                  RT_STRING0x2085680x27cdata0.4716981132075472
                                  RT_STRING0x2087e40x3bcdata0.32426778242677823
                                  RT_STRING0x208ba00x368data0.37844036697247707
                                  RT_STRING0x208f080x2d4data0.39917127071823205
                                  RT_RCDATA0x2091dc0x5cdata0.782608695652174
                                  RT_RCDATA0x2092380x10data1.5
                                  RT_RCDATA0x2092480x7a0data0.5911885245901639
                                  RT_RCDATA0x2099e80x18dDelphi compiled form 'TdiffFrm'0.7581863979848866
                                  RT_RCDATA0x209b780x16a7Delphi compiled form 'TfilepropFrm'0.3386790826004484
                                  RT_RCDATA0x20b2200xcfdDelphi compiled form 'TfolderKindFrm'0.42857142857142855
                                  RT_RCDATA0x20bf200x370Delphi compiled form 'TipsEverFrm'0.5886363636363636
                                  RT_RCDATA0x20c2900x29dDelphi compiled form 'TlistSelectFrm'0.5919282511210763
                                  RT_RCDATA0x20c5300x3cfDelphi compiled form 'TlonginputFrm'0.556923076923077
                                  RT_RCDATA0x20c9000x13ff7Delphi compiled form 'TmainFrm'0.31347438073030487
                                  RT_RCDATA0x2208f80x419Delphi compiled form 'TnewuserpassFrm'0.47569113441372735
                                  RT_RCDATA0x220d140x2676Delphi compiled form 'ToptionsFrm'0.3191143611618932
                                  RT_RCDATA0x22338c0x396Delphi compiled form 'TpurgeFrm'0.5108932461873639
                                  RT_RCDATA0x2237240x363Delphi compiled form 'TrunScriptFrm'0.6147635524798154
                                  RT_RCDATA0x223a880x2fbDelphi compiled form 'TshellExtFrm'0.6120576671035387
                                  RT_GROUP_CURSOR0x223d840x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                                  RT_GROUP_CURSOR0x223d980x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                                  RT_GROUP_CURSOR0x223dac0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                  RT_GROUP_CURSOR0x223dc00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                  RT_GROUP_CURSOR0x223dd40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                  RT_GROUP_CURSOR0x223de80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                  RT_GROUP_CURSOR0x223dfc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                  RT_GROUP_ICON0x223e100x3edataEnglishUnited States0.8709677419354839
                                  RT_VERSION0x223e500x318dataItalianItaly0.4823232323232323
                                  RT_MANIFEST0x2241680x29fXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4977645305514158
                                  DLLImport
                                  oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                  advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                                  user32.dllGetKeyboardType, DestroyWindow, LoadStringA, MessageBoxA, CharNextA
                                  kernel32.dllGetACP, Sleep, VirtualFree, VirtualAlloc, GetTickCount, QueryPerformanceCounter, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, SetCurrentDirectoryA, RemoveDirectoryA, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetCurrentDirectoryA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, ExitThread, CreateThread, CompareStringA, WriteFile, UnhandledExceptionFilter, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetFileType, CreateFileA, CloseHandle
                                  kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
                                  user32.dllCreateWindowExA, WindowFromPoint, WaitMessage, ValidateRect, UpdateWindow, UnregisterClassA, UnionRect, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongW, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetKeyboardState, SetForegroundWindow, SetFocus, SetCursor, SetClipboardData, SetClassLongA, SetCaretPos, SetCapture, SetActiveWindow, SendMessageW, SendMessageA, SendDlgItemMessageA, ScrollWindowEx, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageW, PeekMessageA, OpenClipboard, OffsetRect, OemToCharBuffA, OemToCharA, MsgWaitForMultipleObjects, MessageBoxA, MessageBeep, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageW, IsDialogMessageA, IsClipboardFormatAvailable, IsChild, IsCharAlphaNumericA, IsCharAlphaA, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongW, GetWindowLongA, GetWindowDC, GetUpdateRect, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessageTime, GetMessagePos, GetMessageA, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameA, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDoubleClickTime, GetDlgItem, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameA, GetClassLongA, GetClassInfoA, GetCaretPos, GetCapture, GetAsyncKeyState, GetActiveWindow, FrameRect, FlashWindow, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EnumClipboardFormats, EnumChildWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageW, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DestroyCaret, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIconIndirect, CreateIcon, CreateCaret, CopyImage, CloseClipboard, ClientToScreen, ChildWindowFromPoint, CheckMenuItem, CharUpperBuffW, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerBuffA, CharLowerA, CharUpperBuffA, CharUpperA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
                                  msimg32.dllGradientFill
                                  gdi32.dllUnrealizeObject, StretchBlt, StartPage, StartDocA, SetWindowOrgEx, SetWindowExtEx, SetWinMetaFileBits, SetViewportOrgEx, SetViewportExtEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetMapMode, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SetAbortProc, SelectPalette, SelectObject, SelectClipRgn, SaveDC, RestoreDC, Rectangle, RectVisible, RealizePalette, Polyline, Polygon, PolyPolyline, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPointA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectType, GetObjectA, GetNearestPaletteIndex, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipRgn, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, ExtTextOutA, ExtCreatePen, ExcludeClipRect, EndPage, EndDoc, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreateRectRgn, CreatePenIndirect, CreatePalette, CreateICA, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateDCA, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, CombineRgn, BitBlt
                                  version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
                                  kernel32.dlllstrlenW, lstrcpynW, lstrcpyA, lstrcmpA, WriteFile, WideCharToMultiByte, WaitForSingleObject, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, TerminateProcess, Sleep, SizeofResource, SetThreadPriority, SetThreadLocale, SetLastError, SetFilePointer, SetFileAttributesA, SetEvent, SetErrorMode, SetEndOfFile, SetCurrentDirectoryA, ResumeThread, ResetEvent, ReadFile, QueryPerformanceFrequency, QueryPerformanceCounter, PeekNamedPipe, OutputDebugStringA, OpenProcess, MultiByteToWideChar, MulDiv, MoveFileA, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, IsBadReadPtr, InitializeCriticalSection, GlobalUnlock, GlobalSize, GlobalHandle, GlobalLock, GlobalGetAtomNameA, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetVersionExA, GetVersion, GetTimeZoneInformation, GetTickCount, GetThreadLocale, GetTempPathA, GetTempFileNameA, GetSystemInfo, GetStringTypeExA, GetStdHandle, GetProfileStringA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameW, GetFullPathNameA, GetFileTime, GetFileSize, GetFileAttributesA, GetExitCodeThread, GetExitCodeProcess, GetEnvironmentVariableA, GetDriveTypeA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetCPInfo, GetACP, FreeResource, InterlockedIncrement, InterlockedExchange, InterlockedDecrement, FreeLibrary, FormatMessageA, FindResourceA, FindNextFileA, FindFirstFileA, FindClose, FileTimeToSystemTime, FileTimeToLocalFileTime, FileTimeToDosDateTime, EnumCalendarInfoA, EnterCriticalSection, DeviceIoControl, DeleteFileA, DeleteCriticalSection, CreateThread, CreateProcessA, CreatePipe, CreateMutexA, CreateFileA, CreateEventA, CreateDirectoryA, CompareStringW, CompareStringA, CloseHandle
                                  advapi32.dllRegSetValueExA, RegQueryValueExW, RegQueryValueExA, RegQueryInfoKeyA, RegOpenKeyExW, RegOpenKeyExA, RegFlushKey, RegEnumValueA, RegEnumKeyExA, RegDeleteValueA, RegDeleteKeyA, RegCreateKeyExA, RegCloseKey
                                  kernel32.dllSleep
                                  oleaut32.dllGetErrorInfo, SysFreeString
                                  ole32.dllCoTaskMemFree, CoTaskMemAlloc, StringFromCLSID, CoCreateInstance, CoUninitialize, CoInitialize
                                  oleaut32.dllSafeArrayPtrOfIndex, SafeArrayPutElement, SafeArrayGetElement, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
                                  comctl32.dll_TrackMouseEvent, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_GetIcon, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create, InitCommonControls
                                  shell32.dllShell_NotifyIconA, ShellExecuteA, SHGetFileInfoA, SHFileOperationA, DragQueryFileA, DragAcceptFiles
                                  shell32.dllSHGetPathFromIDListA, SHGetMalloc, SHBrowseForFolderA
                                  winspool.drvOpenPrinterA, EnumPrintersA, DocumentPropertiesA, ClosePrinter
                                  comdlg32.dllChooseFontA, GetSaveFileNameA, GetOpenFileNameA
                                  winmm.dlltimeGetTime, PlaySoundA
                                  kernel32.dllGetVersionExA
                                  kernel32.dllMulDiv
                                  shell32.dll
                                  Language of compilation systemCountry where language is spokenMap
                                  EnglishUnited States
                                  ItalianItaly
                                  TimestampSource PortDest PortSource IPDest IP
                                  Dec 24, 2024 19:50:32.775115013 CET4976480192.168.2.494.23.66.84
                                  Dec 24, 2024 19:50:32.895611048 CET804976494.23.66.84192.168.2.4
                                  Dec 24, 2024 19:50:32.895716906 CET4976480192.168.2.494.23.66.84
                                  Dec 24, 2024 19:50:32.896003962 CET4976480192.168.2.494.23.66.84
                                  Dec 24, 2024 19:50:33.015527964 CET804976494.23.66.84192.168.2.4
                                  Dec 24, 2024 19:50:34.143939018 CET804976494.23.66.84192.168.2.4
                                  Dec 24, 2024 19:50:34.144526005 CET804976494.23.66.84192.168.2.4
                                  Dec 24, 2024 19:50:34.144613028 CET4976480192.168.2.494.23.66.84
                                  Dec 24, 2024 19:50:34.147121906 CET4976480192.168.2.494.23.66.84
                                  Dec 24, 2024 19:50:34.266575098 CET804976494.23.66.84192.168.2.4
                                  TimestampSource PortDest PortSource IPDest IP
                                  Dec 24, 2024 19:50:32.430716991 CET5596053192.168.2.41.1.1.1
                                  Dec 24, 2024 19:50:32.774113894 CET53559601.1.1.1192.168.2.4
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Dec 24, 2024 19:50:32.430716991 CET192.168.2.41.1.1.10x11b4Standard query (0)www.rejetto.comA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Dec 24, 2024 19:50:32.774113894 CET1.1.1.1192.168.2.40x11b4No error (0)www.rejetto.com94.23.66.84A (IP address)IN (0x0001)false
                                  • www.rejetto.com
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.44976494.23.66.84806720C:\Users\user\Desktop\hfs.exe
                                  TimestampBytes transferredDirectionData
                                  Dec 24, 2024 19:50:32.896003962 CET151OUTGET /hfs/hfs.updateinfo.txt HTTP/1.0
                                  Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, */*
                                  User-Agent: HFS/2.3m
                                  Host: www.rejetto.com
                                  Dec 24, 2024 19:50:34.143939018 CET656INHTTP/1.1 200 OK
                                  date: Tue, 24 Dec 2024 18:50:33 GMT
                                  content-type: text/plain
                                  content-length: 253
                                  server: OVHcloud
                                  accept-ranges: bytes
                                  vary: Accept-Encoding
                                  pragma: no-cache
                                  cache-control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                  x-frame-options: SAMEORIGIN
                                  x-iplb-request-id: 082E7BBD:1315_5E174254:0050_676B0279_10086:683F
                                  x-iplb-instance: 52159
                                  connection: close
                                  Data Raw: 48 46 53 20 75 70 64 61 74 65 20 69 6e 66 6f 0d 0a 5b 6c 61 73 74 20 73 74 61 62 6c 65 5d 0d 0a 32 2e 34 2e 30 20 52 43 37 0d 0a 5b 6c 61 73 74 20 73 74 61 62 6c 65 20 62 75 69 6c 64 5d 0d 0a 33 31 39 0d 0a 5b 6c 61 73 74 20 73 74 61 62 6c 65 20 75 72 6c 5d 0d 0a 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 63 6f 6d 2f 72 65 6a 65 74 74 6f 2f 68 66 73 32 2f 72 65 6c 65 61 73 65 73 2f 64 6f 77 6e 6c 6f 61 64 2f 76 32 2e 34 2d 72 63 30 37 2f 68 66 73 2e 65 78 65 0d 0a 5b 6e 6f 74 69 63 65 5d 0d 0a 48 46 53 20 32 2e 33 2f 32 2e 34 20 69 73 20 76 75 6c 6e 65 72 61 62 6c 65 20 74 6f 20 69 6d 70 6f 72 74 61 6e 74 20 61 74 74 61 63 6b 73 21 20 43 6f 6e 73 69 64 65 72 20 75 73 69 6e 67 20 48 46 53 20 33 20 69 6e 73 74 65 61 64 2e 0d 0a 5b 45 4f 46 5d 0d 0a
                                  Data Ascii: HFS update info[last stable]2.4.0 RC7[last stable build]319[last stable url]https://github.com/rejetto/hfs2/releases/download/v2.4-rc07/hfs.exe[notice]HFS 2.3/2.4 is vulnerable to important attacks! Consider using HFS 3 instead.[EOF]


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Target ID:0
                                  Start time:13:49:20
                                  Start date:24/12/2024
                                  Path:C:\Users\user\Desktop\hfs.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\hfs.exe"
                                  Imagebase:0x400000
                                  File size:2'171'904 bytes
                                  MD5 hash:9E8557E98ED1269372FF0ACE91D63477
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:Borland Delphi
                                  Yara matches:
                                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000000.00000000.1659053234.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:false

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:9.5%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:22.9%
                                    Total number of Nodes:48
                                    Total number of Limit Nodes:3

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 407070-4070b1 RegOpenKeyExA 2 4070f3-407136 0->2 3 4070b3-4070cf RegOpenKeyExA 0->3 9 407138-407154 2->9 10 40715a-407174 2->10 3->2 4 4070d1-4070ed RegOpenKeyExA 3->4 4->2 5 40717c-4071ad GetLocaleInfoA 4->5 14 4071b3-4071b7 5->14 15 407296-40729d 5->15 9->10 16 407156 9->16 18 4071c3-4071d9 14->18 19 4071b9-4071bd 14->19 16->10 21 4071dc-4071df 18->21 19->15 19->18 22 4071e1-4071e9 21->22 23 4071eb-4071f3 21->23 22->23 24 4071db 22->24 23->15 25 4071f9-4071fe 23->25 24->21 26 407200-407226 25->26 27 407228-40722a 25->27 26->27 27->15 28 40722c-407230 27->28 28->15 30 407232-407262 LoadLibraryExA 28->30 30->15 33 407264-407294 LoadLibraryExA 30->33 33->15
                                    APIs
                                    • RegOpenKeyExA.KERNELBASE(80000001,Software\Borland\Locales,00000000,000F0019,?), ref: 004070AA
                                    • RegOpenKeyExA.KERNELBASE(80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 004070C8
                                    • RegOpenKeyExA.KERNELBASE(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 004070E6
                                    • GetLocaleInfoA.KERNELBASE(00000000), ref: 0040719F
                                    • LoadLibraryExA.KERNELBASE(00000000,00000000,00000002), ref: 00407259
                                    • LoadLibraryExA.KERNELBASE(00000000,00000000,00000002), ref: 0040728F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2924840311.0000000000407000.00000040.00000001.01000000.00000003.sdmp, Offset: 00407000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_407000_hfs.jbxd
                                    Similarity
                                    • API ID: Open$LibraryLoad$InfoLocale
                                    • String ID: .$Software\Borland\Delphi\Locales$Software\Borland\Locales
                                    • API String ID: 4041025014-3917250287
                                    • Opcode ID: 4bc055594a0b34e814b33aaf8fc9219e5e9fc34e973681e86cc46028133426e9
                                    • Instruction ID: c5ff98c6a6139f93c6704c79ab18b06f40684caa607cb0862b16daa4c1cf1b01
                                    • Opcode Fuzzy Hash: 4bc055594a0b34e814b33aaf8fc9219e5e9fc34e973681e86cc46028133426e9
                                    • Instruction Fuzzy Hash: 80517171E0420C7EFB21D6A49C46FEF77AC9B04744F4441B6BA04F66C2E678AE448B69

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 35 407f7e-407fa4 CreateMutexA
                                    APIs
                                    • CreateMutexA.KERNEL32(?,?,?), ref: 00407F97
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2924840311.0000000000407000.00000040.00000001.01000000.00000003.sdmp, Offset: 00407000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_407000_hfs.jbxd
                                    Similarity
                                    • API ID: CreateMutex
                                    • String ID:
                                    • API String ID: 1964310414-0
                                    • Opcode ID: aac90e20a50084a577ced6f325ddde7fae3f822483f87fcda839c5e40715e318
                                    • Instruction ID: c790e31c200fdd215013f6f20d056eb62fdbe26bf6d17a02c93ee99176357472
                                    • Opcode Fuzzy Hash: aac90e20a50084a577ced6f325ddde7fae3f822483f87fcda839c5e40715e318
                                    • Instruction Fuzzy Hash: 6BD05E73A14208FFCB00DFADDC05D9E73ECEB18254B108429F418D7100D239EA009B24

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 37 407f80-407fa4 CreateMutexA
                                    APIs
                                    • CreateMutexA.KERNEL32(?,?,?), ref: 00407F97
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2924840311.0000000000407000.00000040.00000001.01000000.00000003.sdmp, Offset: 00407000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_407000_hfs.jbxd
                                    Similarity
                                    • API ID: CreateMutex
                                    • String ID:
                                    • API String ID: 1964310414-0
                                    • Opcode ID: 485a42cfd74afe0bd6fd3a83a5c21534c4123a8668d01e8793639fac456bf432
                                    • Instruction ID: 349e1c842927ee80bb4e6aaef0f9b1f8cd2ec333b2a73608cae7dd49179f51a1
                                    • Opcode Fuzzy Hash: 485a42cfd74afe0bd6fd3a83a5c21534c4123a8668d01e8793639fac456bf432
                                    • Instruction Fuzzy Hash: 21D05E73914208FFCB00DFA9D805D8E73ECEB18254B108429F418D7100D239EA009B24

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 38 421970-421983 39 421985-42198a 38->39 40 42198d-4219b0 38->40 39->40 43 4219b2-4219dd 40->43 44 421a0b-421a11 40->44 46 4219e5-4219ff 43->46
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2924854727.0000000000421000.00000040.00000001.01000000.00000003.sdmp, Offset: 00421000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_421000_hfs.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e65c068728c9befbfb0bd2696387d1c550580650a046a058749063818c853c7b
                                    • Instruction ID: d1efd2674946ddcb1477498d5fd98560e8a1a96f26c859c93cd1a0151d6e3682
                                    • Opcode Fuzzy Hash: e65c068728c9befbfb0bd2696387d1c550580650a046a058749063818c853c7b
                                    • Instruction Fuzzy Hash: EA115474E04648EFDB00DFA8D851AADFBF4EB45304F5180AAE504B7390D7355E41CB54

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 49 421b30-421b5c 50 421b5e-421b67 49->50 51 421bbf-421bd4 49->51 50->51 52 421b69-421bb4 call 421b30 call 421970 50->52 63 421bb9-421bbc 52->63 63->51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2924854727.0000000000421000.00000040.00000001.01000000.00000003.sdmp, Offset: 00421000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_421000_hfs.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4e97f87f3650c6f85148b80b62df0b5d7665720ffbccf451877ef4d4b30a3dd6
                                    • Instruction ID: 6589792cef98e809a9812f7c702a5b4da44f9991f1cefcbb9db66082a6a87442
                                    • Opcode Fuzzy Hash: 4e97f87f3650c6f85148b80b62df0b5d7665720ffbccf451877ef4d4b30a3dd6
                                    • Instruction Fuzzy Hash: 0D115E34A00148EFCB00DBA9D882D8DBBF5EF54304FA184A6E404E7661E774AF44CB59

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 64 421bea-421c28 66 421c2a call 421a14 64->66 67 421c2f-421c46 call 421b30 64->67 66->67 71 421c4b-421c53 67->71 72 421c55 call 421a7c 71->72 73 421c5a-421c6b 71->73 72->73 76 421c72 73->76 77 421c6d call 421ac4 73->77 77->76
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2924854727.0000000000421000.00000040.00000001.01000000.00000003.sdmp, Offset: 00421000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_421000_hfs.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4b6f4cad14f15868b6e16b35edbab0d0b0f9e8558c8b281c2a1114a9fb214b43
                                    • Instruction ID: 9d60802b55ce9ca12f46bf9c0685bb143f0351e90864b0859f2ecfdc362365b2
                                    • Opcode Fuzzy Hash: 4b6f4cad14f15868b6e16b35edbab0d0b0f9e8558c8b281c2a1114a9fb214b43
                                    • Instruction Fuzzy Hash: 9601F538B40294BED716AF66E8017ADBFF8EF2A700FD540E6E40052271DB395D41C61C

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 79 4213e8-421407 81 42142c-42143b 79->81 83 421409-42140c 81->83 84 42143d-421454 call 421044 81->84 87 421416-42141f 83->87 87->84 89 421421-421429 87->89 89->81
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2924854727.0000000000421000.00000040.00000001.01000000.00000003.sdmp, Offset: 00421000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_421000_hfs.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9f64d00ef102ad1af902d2e05236edb25d0ea4c129a09f24e2c0ec02db4d65ab
                                    • Instruction ID: 8edcc4c43b3520b0e993df5f19bf5dbf676e64913b229a4b9fb3c6233d21f5cd
                                    • Opcode Fuzzy Hash: 9f64d00ef102ad1af902d2e05236edb25d0ea4c129a09f24e2c0ec02db4d65ab
                                    • Instruction Fuzzy Hash: 79F03C38704214FFC710EF55F95196977F8EB643147F18066F808A3662EA39AE02AB4C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2924840311.0000000000407000.00000040.00000001.01000000.00000003.sdmp, Offset: 00407000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_407000_hfs.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f47502fed7009dd2242633c869eb6d4c5e6d7f210b0dba8c156ea9c0ec4b88f2
                                    • Instruction ID: c1fed7b65ea2b632cabae2a3fa9ac6ceb8095e1cb4539e7ca024ea703b2bd8d1
                                    • Opcode Fuzzy Hash: f47502fed7009dd2242633c869eb6d4c5e6d7f210b0dba8c156ea9c0ec4b88f2
                                    • Instruction Fuzzy Hash: