Scan Result:
TMeter.exe
Sample Information
SHA256 | |
Sample Name | |
File Size |
1.1 MB 1139712 Bytes |
First Seen |
2025-02-06 09:14 UTC+0000 1 month, 1 week ago. |
General
MIME Type | |
MD5 Hash | |
Architecture | x86-32 (PE32) |
Compile Time |
2020-07-20 12:02 4 years, 7 months ago. |
Image Base |
0x400000
|
Entry Point |
0xf0d34
|
PEID Signatures
Borland_Delphi_40_additional
Microsoft_Visual_Cpp_v50v60_MFC
Borland_Delphi_30_additional
Borland_Delphi_30_
Borland_Delphi_Setup_Module
Borland_Delphi_40
Borland_Delphi_v40_v50
BobSoft_Mini_Delphi_BoB_BobSoft_additional
Borland_Delphi_v60_v70
Borland_Delphi_v30
Borland_Delphi_DLL
Important Imports
- UnhookWindowsHookEx
- CallNextHookEx
- IsDebuggerPresent
- SuspendThread
- VirtualAlloc
- CreateProcessW
- ResumeThread
- GetDesktopWindow
- GetClipboardData
- RegSetValueExW
- RegConnectRegistryW
- RegEnumKeyExW
- RegLoadKeyW
- RegOpenKeyExW
- RegQueryInfoKeyW
- RegQueryValueExW
- RegEnumValueW
- RegCreateKeyExW
- FindResourceW
- UnhandledExceptionFilter
- VirtualQuery
- VirtualQueryEx
- GetTickCount
- GetProcAddress
Matching Rules
Rule Name | Rule Type |
---|---|
YARA_QEMU_REGISTRY | YARA |
YARA_Detect_Possible_GetForegroundWindow_Evasion | YARA |
YARA_Findcrypt | YARA |
YARA_VBOX_REGISTRY | YARA |
YARA_Detect_Bobsoft | YARA |
Matching Techniques
Technique Name | Technique ID's | Snippet(s) | Rules(s) | OS |
---|---|---|---|---|
Detecting Virtual Environment Artefacts | U1332 | |||
Cryptography | U0703 E1027.m04 | |||
Wiping or Encrypting | U0301 | |||
BobSoft Mini Delphi Packer | U1428 |