Windows
Analysis Report
hfs.exe
Overview
General Information
Detection
Score: | 64 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- hfs.exe (PID: 6720 cmdline:
"C:\Users\ user\Deskt op\hfs.exe " MD5: 9E8557E98ED1269372FF0ACE91D63477)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security | ||
INDICATOR_TOOL_HFS_WebServer | Detects HFS Web Server | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security | ||
INDICATOR_TOOL_HFS_WebServer | Detects HFS Web Server | ditekSHen |
|
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | ReversingLabs: |
Source: | Static PE information: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_00407FCE |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Binary string: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Key opened: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window found: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Window detected: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00407A3B | |
Source: | Code function: | 0_2_00407A3B |
Source: | Process information set: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Code function: | 0_2_00407070 |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 2 Command and Scripting Interpreter | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Masquerading | OS Credential Dumping | 1 Security Software Discovery | Remote Services | Data from Local System | 2 Non-Application Layer Protocol | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | LSASS Memory | 1 File and Directory Discovery | Remote Desktop Protocol | Data from Removable Media | 2 Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Obfuscated Files or Information | Security Account Manager | 11 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Ingress Tool Transfer | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
18% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
www.rejetto.com | 94.23.66.84 | true | false | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | unknown | |||
false |
| unknown | ||
false | high | |||
false | unknown | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | unknown | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | unknown | |||
false |
| unknown | ||
false | high | |||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
94.23.66.84 | www.rejetto.com | France | 16276 | OVHFR | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1580504 |
Start date and time: | 2024-12-24 19:48:31 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 54s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 5 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | hfs.exe |
Detection: | MAL |
Classification: | mal64.winEXE@1/0@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 52.149.20.212, 13.107.246.63
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: hfs.exe
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
94.23.66.84 | Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
www.rejetto.com | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
OVHFR | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
|
File type: | |
Entropy (8bit): | 6.57278230008726 |
TrID: |
|
File name: | hfs.exe |
File size: | 2'171'904 bytes |
MD5: | 9e8557e98ed1269372ff0ace91d63477 |
SHA1: | d0c4192b65e36553f6fd2b83f3123f6ae8380dac |
SHA256: | e678899d7ea9702184167b56655f91a69f8a0bdc9df65612762252c053c2cd7c |
SHA512: | c1a338c0414ac68d7ce24df06f3b665a56feae15063332324fea3250f1e77c19209ea3d89fe3a06d48974cce70bd9c65d59b7e2fbaf27c3f01ac2e898057e9ec |
SSDEEP: | 49152:UR0LvNmmh9otEKMx9XSNVBOw+V4UvEbAThhiqvyo98ZcW7SZ:UR0xmmh9GEKgpSNVBr72QN |
TLSH: | ECA56B22F690C437D17736799CA793C56928BB502E14990B3AE87F4CBF793C13D1229A |
File Content Preview: | MZP.....................@...............................................!..L.!..This program must be run under Win32..$7....................................................................................................................................... |
Icon Hash: | 1b3b13333101860c |
Entrypoint: | 0x579ca0 |
Entrypoint Section: | .itext |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI |
DLL Characteristics: | NX_COMPAT |
Time Stamp: | 0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | eb58f6a65d91e853b4dcfa5f6c10386b |
Instruction |
---|
push ebp |
mov ebp, esp |
add esp, FFFFFFECh |
push ebx |
xor eax, eax |
mov dword ptr [ebp-14h], eax |
mov eax, 005771F0h |
call 00007F953C9BA54Bh |
mov ebx, dword ptr [00582958h] |
xor eax, eax |
push ebp |
push 00579E14h |
push dword ptr fs:[eax] |
mov dword ptr fs:[eax], esp |
mov eax, dword ptr [005825DCh] |
mov eax, dword ptr [eax] |
mov dword ptr [eax+14h], 0057704Ch |
push 00000011h |
call 00007F953C9BB1C6h |
movsx eax, ax |
test ah, FFFFFF80h |
jne 00007F953CB2C75Eh |
mov eax, dword ptr [005825DCh] |
mov eax, dword ptr [eax] |
mov edx, 00579E2Ch |
call 00007F953CA43F7Dh |
test al, al |
jne 00007F953CB2C722h |
mov eax, dword ptr [005825DCh] |
mov eax, dword ptr [eax] |
mov ecx, dword ptr [eax+0Ch] |
lea eax, dword ptr [ebp-14h] |
mov edx, 00579E44h |
call 00007F953C9B8162h |
mov eax, dword ptr [ebp-14h] |
xor ecx, ecx |
mov edx, 00000010h |
call 00007F953CAC49FFh |
mov eax, 00000001h |
call 00007F953C9B7D4Dh |
mov eax, dword ptr [005825DCh] |
mov eax, dword ptr [eax] |
cmp byte ptr [eax+08h], 00000000h |
jne 00007F953CB2C70Ch |
call 00007F953CB29A9Bh |
test al, al |
je 00007F953CB2C703h |
mov eax, dword ptr [005825DCh] |
mov eax, dword ptr [eax] |
call 00007F953CA43FFFh |
jmp 00007F953CB2C7A0h |
mov eax, dword ptr [ebx] |
call 00007F953CA4208Bh |
mov eax, dword ptr [00582A14h] |
mov eax, dword ptr [eax] |
mov dl, 01h |
call 00007F953CA58825h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x191000 | 0x3966 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x1ad000 | 0x77600 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x197000 | 0x15764 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x196018 | 0x2d | .rdata |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x196000 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x191acc | 0x8d8 | .idata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x1766b8 | 0x176800 | 3f942d6c37616e0d8d9ac5fd5876e441 | False | 0.46303404539385845 | data | 6.429015159978142 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.itext | 0x178000 | 0x1e64 | 0x2000 | f4582be31f56c88cbd18ab7ba9099d38 | False | 0.549072265625 | data | 6.18976186886786 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.data | 0x17a000 | 0x8c94 | 0x8e00 | 9f9a41de15042165e91ffa796cbd7dc1 | False | 0.5568056778169014 | data | 5.687851591548669 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.bss | 0x183000 | 0xd974 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0x191000 | 0x3966 | 0x3a00 | 87db3a2d95e6a0a244ebc9dc6a2f460d | False | 0.31276939655172414 | data | 5.164467768035724 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.tls | 0x195000 | 0x44 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rdata | 0x196000 | 0x45 | 0x200 | c7f385b277b29965aeda94ad0884eccc | False | 0.142578125 | data | 0.9956758247090713 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x197000 | 0x15764 | 0x15800 | eec81278c172ce8dcc7aa4a87e5d3dd7 | False | 0.5875726744186046 | data | 6.701161684807333 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.rsrc | 0x1ad000 | 0x77600 | 0x77600 | e474116bbf0bad0c701fe37e23c3c0d9 | False | 0.3714721040575916 | data | 5.963918185992459 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
GIF | 0x1aea00 | 0x179e | GIF image data, version 89a, 387 x 169 | English | United States | 1.0018193847171684 |
TEXT | 0x1b01a0 | 0x30b | ASCII text, with CRLF line terminators | English | United States | 0.4672657252888318 |
TEXT | 0x1b04ac | 0x109 | ASCII text, with CRLF line terminators | English | United States | 0.8377358490566038 |
TEXT | 0x1b05b8 | 0xc779 | HTML document, ASCII text, with CRLF line terminators | English | United States | 0.29681778125917946 |
TEXT | 0x1bcd34 | 0x236 | HTML document, ASCII text, with CRLF line terminators | English | United States | 0.4911660777385159 |
TEXT | 0x1bcf6c | 0x56 | ASCII text, with CRLF line terminators | English | United States | 0.6395348837209303 |
TEXT | 0x1bcfc4 | 0x1c9 | ASCII text, with CRLF line terminators | English | United States | 0.6258205689277899 |
TEXT | 0x1bd190 | 0x14b | ASCII text, with CRLF line terminators | English | United States | 0.6374622356495468 |
TEXT | 0x1bd2dc | 0x119ee | ASCII text, with very long lines (820) | English | United States | 0.3407459750048494 |
TEXT | 0x1ceccc | 0xc1 | ASCII text, with CRLF line terminators | English | United States | 0.7409326424870466 |
TEXT | 0x1ced90 | 0x124 | ASCII text, with CRLF line terminators | English | United States | 0.7157534246575342 |
UNICODEDATA | 0x1ceeb4 | 0x723f | data | 0.36769583205115053 | ||
UNICODEDATA | 0x1d60f4 | 0x7ebd | data | 0.42552011095700415 | ||
UNICODEDATA | 0x1ddfb4 | 0x6a8 | data | 0.5985915492957746 | ||
UNICODEDATA | 0x1de65c | 0xaf7d | data | 0.4191430161380078 | ||
UNICODEDATA | 0x1e95dc | 0xd3cf | data | 0.4500857569666009 | ||
UNICODEDATA | 0x1f69ac | 0x14c5 | data | 0.6482979123565921 | ||
RT_CURSOR | 0x1f7e74 | 0x134 | Targa image data - Map 64 x 65536 x 1 +32 "\001" | English | United States | 0.38636363636363635 |
RT_CURSOR | 0x1f7fa8 | 0x134 | data | English | United States | 0.4642857142857143 |
RT_CURSOR | 0x1f80dc | 0x134 | data | English | United States | 0.4805194805194805 |
RT_CURSOR | 0x1f8210 | 0x134 | data | English | United States | 0.38311688311688313 |
RT_CURSOR | 0x1f8344 | 0x134 | data | English | United States | 0.36038961038961037 |
RT_CURSOR | 0x1f8478 | 0x134 | data | English | United States | 0.4090909090909091 |
RT_CURSOR | 0x1f85ac | 0x134 | Targa image data - RGB 64 x 65536 x 1 +32 "\001" | English | United States | 0.4967532467532468 |
RT_BITMAP | 0x1f86e0 | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | English | United States | 0.43103448275862066 |
RT_BITMAP | 0x1f88b0 | 0x1e4 | Device independent bitmap graphic, 36 x 19 x 4, image size 380 | English | United States | 0.46487603305785125 |
RT_BITMAP | 0x1f8a94 | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | English | United States | 0.43103448275862066 |
RT_BITMAP | 0x1f8c64 | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | English | United States | 0.39870689655172414 |
RT_BITMAP | 0x1f8e34 | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | English | United States | 0.4245689655172414 |
RT_BITMAP | 0x1f9004 | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | English | United States | 0.5021551724137931 |
RT_BITMAP | 0x1f91d4 | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | English | United States | 0.5064655172413793 |
RT_BITMAP | 0x1f93a4 | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | English | United States | 0.39655172413793105 |
RT_BITMAP | 0x1f9574 | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | English | United States | 0.5344827586206896 |
RT_BITMAP | 0x1f9744 | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | English | United States | 0.39655172413793105 |
RT_BITMAP | 0x1f9914 | 0xc0 | Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors | English | United States | 0.5208333333333334 |
RT_BITMAP | 0x1f99d4 | 0xe0 | Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors | English | United States | 0.42857142857142855 |
RT_BITMAP | 0x1f9ab4 | 0xe0 | Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors | English | United States | 0.4955357142857143 |
RT_BITMAP | 0x1f9b94 | 0xe0 | Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors | English | United States | 0.38392857142857145 |
RT_BITMAP | 0x1f9c74 | 0xc0 | Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors | English | United States | 0.4947916666666667 |
RT_BITMAP | 0x1f9d34 | 0xc0 | Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors | English | United States | 0.484375 |
RT_BITMAP | 0x1f9df4 | 0xe0 | Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors | English | United States | 0.42410714285714285 |
RT_BITMAP | 0x1f9ed4 | 0xc0 | Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors | English | United States | 0.5104166666666666 |
RT_BITMAP | 0x1f9f94 | 0xe0 | Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors | English | United States | 0.5 |
RT_BITMAP | 0x1fa074 | 0xe8 | Device independent bitmap graphic, 16 x 16 x 4, image size 128 | English | United States | 0.4870689655172414 |
RT_BITMAP | 0x1fa15c | 0xc0 | Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colors | English | United States | 0.4895833333333333 |
RT_BITMAP | 0x1fa21c | 0xe0 | Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colors | English | United States | 0.3794642857142857 |
RT_ICON | 0x1fa2fc | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 0 | English | United States | 0.5184647302904565 |
RT_ICON | 0x1fc8a4 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 0 | English | United States | 0.49120217288615964 |
RT_ICON | 0x200acc | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 0 | English | United States | 0.723826714801444 |
RT_ICON | 0x201374 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 0 | English | United States | 0.5657514450867052 |
RT_DIALOG | 0x2018dc | 0x52 | data | 0.7682926829268293 | ||
RT_DIALOG | 0x201930 | 0x52 | data | 0.7560975609756098 | ||
RT_STRING | 0x201984 | 0x9c | data | 0.41025641025641024 | ||
RT_STRING | 0x201a20 | 0x808 | data | 0.14688715953307394 | ||
RT_STRING | 0x202228 | 0x858 | data | 0.14887640449438203 | ||
RT_STRING | 0x202a80 | 0x898 | data | 0.1390909090909091 | ||
RT_STRING | 0x203318 | 0x7a8 | data | 0.16887755102040816 | ||
RT_STRING | 0x203ac0 | 0x944 | data | 0.12310286677908938 | ||
RT_STRING | 0x204404 | 0x9f4 | data | 0.12676609105180534 | ||
RT_STRING | 0x204df8 | 0x5f0 | data | 0.3092105263157895 | ||
RT_STRING | 0x2053e8 | 0x248 | data | 0.4160958904109589 | ||
RT_STRING | 0x205630 | 0x27c | data | 0.3663522012578616 | ||
RT_STRING | 0x2058ac | 0x224 | data | 0.4635036496350365 | ||
RT_STRING | 0x205ad0 | 0x45c | data | 0.3870967741935484 | ||
RT_STRING | 0x205f2c | 0x414 | data | 0.39846743295019155 | ||
RT_STRING | 0x206340 | 0x314 | data | 0.3946700507614213 | ||
RT_STRING | 0x206654 | 0x424 | data | 0.42452830188679247 | ||
RT_STRING | 0x206a78 | 0x21c | data | 0.5314814814814814 | ||
RT_STRING | 0x206c94 | 0xc8 | data | 0.67 | ||
RT_STRING | 0x206d5c | 0x18c | data | 0.5353535353535354 | ||
RT_STRING | 0x206ee8 | 0x230 | data | 0.49642857142857144 | ||
RT_STRING | 0x207118 | 0x41c | data | 0.37927756653992395 | ||
RT_STRING | 0x207534 | 0x398 | data | 0.3815217391304348 | ||
RT_STRING | 0x2078cc | 0x37c | data | 0.3968609865470852 | ||
RT_STRING | 0x207c48 | 0x368 | data | 0.3394495412844037 | ||
RT_STRING | 0x207fb0 | 0x43c | data | 0.3763837638376384 | ||
RT_STRING | 0x2083ec | 0xcc | data | 0.5392156862745098 | ||
RT_STRING | 0x2084b8 | 0xb0 | data | 0.6534090909090909 | ||
RT_STRING | 0x208568 | 0x27c | data | 0.4716981132075472 | ||
RT_STRING | 0x2087e4 | 0x3bc | data | 0.32426778242677823 | ||
RT_STRING | 0x208ba0 | 0x368 | data | 0.37844036697247707 | ||
RT_STRING | 0x208f08 | 0x2d4 | data | 0.39917127071823205 | ||
RT_RCDATA | 0x2091dc | 0x5c | data | 0.782608695652174 | ||
RT_RCDATA | 0x209238 | 0x10 | data | 1.5 | ||
RT_RCDATA | 0x209248 | 0x7a0 | data | 0.5911885245901639 | ||
RT_RCDATA | 0x2099e8 | 0x18d | Delphi compiled form 'TdiffFrm' | 0.7581863979848866 | ||
RT_RCDATA | 0x209b78 | 0x16a7 | Delphi compiled form 'TfilepropFrm' | 0.3386790826004484 | ||
RT_RCDATA | 0x20b220 | 0xcfd | Delphi compiled form 'TfolderKindFrm' | 0.42857142857142855 | ||
RT_RCDATA | 0x20bf20 | 0x370 | Delphi compiled form 'TipsEverFrm' | 0.5886363636363636 | ||
RT_RCDATA | 0x20c290 | 0x29d | Delphi compiled form 'TlistSelectFrm' | 0.5919282511210763 | ||
RT_RCDATA | 0x20c530 | 0x3cf | Delphi compiled form 'TlonginputFrm' | 0.556923076923077 | ||
RT_RCDATA | 0x20c900 | 0x13ff7 | Delphi compiled form 'TmainFrm' | 0.31347438073030487 | ||
RT_RCDATA | 0x2208f8 | 0x419 | Delphi compiled form 'TnewuserpassFrm' | 0.47569113441372735 | ||
RT_RCDATA | 0x220d14 | 0x2676 | Delphi compiled form 'ToptionsFrm' | 0.3191143611618932 | ||
RT_RCDATA | 0x22338c | 0x396 | Delphi compiled form 'TpurgeFrm' | 0.5108932461873639 | ||
RT_RCDATA | 0x223724 | 0x363 | Delphi compiled form 'TrunScriptFrm' | 0.6147635524798154 | ||
RT_RCDATA | 0x223a88 | 0x2fb | Delphi compiled form 'TshellExtFrm' | 0.6120576671035387 | ||
RT_GROUP_CURSOR | 0x223d84 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.25 |
RT_GROUP_CURSOR | 0x223d98 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.25 |
RT_GROUP_CURSOR | 0x223dac | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x223dc0 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x223dd4 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x223de8 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x223dfc | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_ICON | 0x223e10 | 0x3e | data | English | United States | 0.8709677419354839 |
RT_VERSION | 0x223e50 | 0x318 | data | Italian | Italy | 0.4823232323232323 |
RT_MANIFEST | 0x224168 | 0x29f | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.4977645305514158 |
DLL | Import |
---|---|
oleaut32.dll | SysFreeString, SysReAllocStringLen, SysAllocStringLen |
advapi32.dll | RegQueryValueExA, RegOpenKeyExA, RegCloseKey |
user32.dll | GetKeyboardType, DestroyWindow, LoadStringA, MessageBoxA, CharNextA |
kernel32.dll | GetACP, Sleep, VirtualFree, VirtualAlloc, GetTickCount, QueryPerformanceCounter, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, SetCurrentDirectoryA, RemoveDirectoryA, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetCurrentDirectoryA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, ExitThread, CreateThread, CompareStringA, WriteFile, UnhandledExceptionFilter, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetFileType, CreateFileA, CloseHandle |
kernel32.dll | TlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA |
user32.dll | CreateWindowExA, WindowFromPoint, WaitMessage, ValidateRect, UpdateWindow, UnregisterClassA, UnionRect, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongW, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetKeyboardState, SetForegroundWindow, SetFocus, SetCursor, SetClipboardData, SetClassLongA, SetCaretPos, SetCapture, SetActiveWindow, SendMessageW, SendMessageA, SendDlgItemMessageA, ScrollWindowEx, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageW, PeekMessageA, OpenClipboard, OffsetRect, OemToCharBuffA, OemToCharA, MsgWaitForMultipleObjects, MessageBoxA, MessageBeep, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageW, IsDialogMessageA, IsClipboardFormatAvailable, IsChild, IsCharAlphaNumericA, IsCharAlphaA, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongW, GetWindowLongA, GetWindowDC, GetUpdateRect, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessageTime, GetMessagePos, GetMessageA, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameA, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDoubleClickTime, GetDlgItem, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameA, GetClassLongA, GetClassInfoA, GetCaretPos, GetCapture, GetAsyncKeyState, GetActiveWindow, FrameRect, FlashWindow, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EnumClipboardFormats, EnumChildWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageW, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DestroyCaret, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIconIndirect, CreateIcon, CreateCaret, CopyImage, CloseClipboard, ClientToScreen, ChildWindowFromPoint, CheckMenuItem, CharUpperBuffW, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerBuffA, CharLowerA, CharUpperBuffA, CharUpperA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout |
msimg32.dll | GradientFill |
gdi32.dll | UnrealizeObject, StretchBlt, StartPage, StartDocA, SetWindowOrgEx, SetWindowExtEx, SetWinMetaFileBits, SetViewportOrgEx, SetViewportExtEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetMapMode, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SetAbortProc, SelectPalette, SelectObject, SelectClipRgn, SaveDC, RestoreDC, Rectangle, RectVisible, RealizePalette, Polyline, Polygon, PolyPolyline, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPointA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectType, GetObjectA, GetNearestPaletteIndex, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipRgn, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, ExtTextOutA, ExtCreatePen, ExcludeClipRect, EndPage, EndDoc, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreateRectRgn, CreatePenIndirect, CreatePalette, CreateICA, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateDCA, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, CombineRgn, BitBlt |
version.dll | VerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA |
kernel32.dll | lstrlenW, lstrcpynW, lstrcpyA, lstrcmpA, WriteFile, WideCharToMultiByte, WaitForSingleObject, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, TerminateProcess, Sleep, SizeofResource, SetThreadPriority, SetThreadLocale, SetLastError, SetFilePointer, SetFileAttributesA, SetEvent, SetErrorMode, SetEndOfFile, SetCurrentDirectoryA, ResumeThread, ResetEvent, ReadFile, QueryPerformanceFrequency, QueryPerformanceCounter, PeekNamedPipe, OutputDebugStringA, OpenProcess, MultiByteToWideChar, MulDiv, MoveFileA, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, IsBadReadPtr, InitializeCriticalSection, GlobalUnlock, GlobalSize, GlobalHandle, GlobalLock, GlobalGetAtomNameA, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetVersionExA, GetVersion, GetTimeZoneInformation, GetTickCount, GetThreadLocale, GetTempPathA, GetTempFileNameA, GetSystemInfo, GetStringTypeExA, GetStdHandle, GetProfileStringA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameW, GetFullPathNameA, GetFileTime, GetFileSize, GetFileAttributesA, GetExitCodeThread, GetExitCodeProcess, GetEnvironmentVariableA, GetDriveTypeA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetCPInfo, GetACP, FreeResource, InterlockedIncrement, InterlockedExchange, InterlockedDecrement, FreeLibrary, FormatMessageA, FindResourceA, FindNextFileA, FindFirstFileA, FindClose, FileTimeToSystemTime, FileTimeToLocalFileTime, FileTimeToDosDateTime, EnumCalendarInfoA, EnterCriticalSection, DeviceIoControl, DeleteFileA, DeleteCriticalSection, CreateThread, CreateProcessA, CreatePipe, CreateMutexA, CreateFileA, CreateEventA, CreateDirectoryA, CompareStringW, CompareStringA, CloseHandle |
advapi32.dll | RegSetValueExA, RegQueryValueExW, RegQueryValueExA, RegQueryInfoKeyA, RegOpenKeyExW, RegOpenKeyExA, RegFlushKey, RegEnumValueA, RegEnumKeyExA, RegDeleteValueA, RegDeleteKeyA, RegCreateKeyExA, RegCloseKey |
kernel32.dll | Sleep |
oleaut32.dll | GetErrorInfo, SysFreeString |
ole32.dll | CoTaskMemFree, CoTaskMemAlloc, StringFromCLSID, CoCreateInstance, CoUninitialize, CoInitialize |
oleaut32.dll | SafeArrayPtrOfIndex, SafeArrayPutElement, SafeArrayGetElement, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit |
comctl32.dll | _TrackMouseEvent, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_GetIcon, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create, InitCommonControls |
shell32.dll | Shell_NotifyIconA, ShellExecuteA, SHGetFileInfoA, SHFileOperationA, DragQueryFileA, DragAcceptFiles |
shell32.dll | SHGetPathFromIDListA, SHGetMalloc, SHBrowseForFolderA |
winspool.drv | OpenPrinterA, EnumPrintersA, DocumentPropertiesA, ClosePrinter |
comdlg32.dll | ChooseFontA, GetSaveFileNameA, GetOpenFileNameA |
winmm.dll | timeGetTime, PlaySoundA |
kernel32.dll | GetVersionExA |
kernel32.dll | MulDiv |
shell32.dll |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States | |
Italian | Italy |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 24, 2024 19:50:32.775115013 CET | 49764 | 80 | 192.168.2.4 | 94.23.66.84 |
Dec 24, 2024 19:50:32.895611048 CET | 80 | 49764 | 94.23.66.84 | 192.168.2.4 |
Dec 24, 2024 19:50:32.895716906 CET | 49764 | 80 | 192.168.2.4 | 94.23.66.84 |
Dec 24, 2024 19:50:32.896003962 CET | 49764 | 80 | 192.168.2.4 | 94.23.66.84 |
Dec 24, 2024 19:50:33.015527964 CET | 80 | 49764 | 94.23.66.84 | 192.168.2.4 |
Dec 24, 2024 19:50:34.143939018 CET | 80 | 49764 | 94.23.66.84 | 192.168.2.4 |
Dec 24, 2024 19:50:34.144526005 CET | 80 | 49764 | 94.23.66.84 | 192.168.2.4 |
Dec 24, 2024 19:50:34.144613028 CET | 49764 | 80 | 192.168.2.4 | 94.23.66.84 |
Dec 24, 2024 19:50:34.147121906 CET | 49764 | 80 | 192.168.2.4 | 94.23.66.84 |
Dec 24, 2024 19:50:34.266575098 CET | 80 | 49764 | 94.23.66.84 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 24, 2024 19:50:32.430716991 CET | 55960 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 24, 2024 19:50:32.774113894 CET | 53 | 55960 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 24, 2024 19:50:32.430716991 CET | 192.168.2.4 | 1.1.1.1 | 0x11b4 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 24, 2024 19:50:32.774113894 CET | 1.1.1.1 | 192.168.2.4 | 0x11b4 | No error (0) | 94.23.66.84 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49764 | 94.23.66.84 | 80 | 6720 | C:\Users\user\Desktop\hfs.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Dec 24, 2024 19:50:32.896003962 CET | 151 | OUT | |
Dec 24, 2024 19:50:34.143939018 CET | 656 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 13:49:20 |
Start date: | 24/12/2024 |
Path: | C:\Users\user\Desktop\hfs.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 2'171'904 bytes |
MD5 hash: | 9E8557E98ED1269372FF0ACE91D63477 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage: | 9.5% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 22.9% |
Total number of Nodes: | 48 |
Total number of Limit Nodes: | 3 |
Graph
Function 00407070 Relevance: 15.9, APIs: 6, Strings: 3, Instructions: 184registrylibraryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00421970 Relevance: .1, Instructions: 54COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00421B30 Relevance: .1, Instructions: 53COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00421BEA Relevance: .0, Instructions: 43COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004213E8 Relevance: .0, Instructions: 35COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407FCE Relevance: .0, Instructions: 2COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|